Overview
overview
10Static
static
10VenomRAT_v...us.dll
windows10-1703-x64
1VenomRAT_v...at.dll
windows10-1703-x64
1VenomRAT_v...ns.dll
windows10-1703-x64
1VenomRAT_v...er.dll
windows10-1703-x64
1VenomRAT_v...ry.dll
windows10-1703-x64
1VenomRAT_v...it.dll
windows10-1703-x64
1VenomRAT_v...ra.dll
windows10-1703-x64
1VenomRAT_v...op.dll
windows10-1703-x64
1VenomRAT_v...xy.dll
windows10-1703-x64
1VenomRAT_v...le.dll
windows10-1703-x64
1VenomRAT_v...ry.dll
windows10-1703-x64
1VenomRAT_v...er.dll
windows10-1703-x64
1VenomRAT_v...nc.exe
windows10-1703-x64
1VenomRAT_v...op.dll
windows10-1703-x64
1VenomRAT_v...op.dll
windows10-1703-x64
3VenomRAT_v...cs.dll
windows10-1703-x64
1VenomRAT_v...es.ps1
windows10-1703-x64
3VenomRAT_v...es.ps1
windows10-1703-x64
3VenomRAT_v...ny.exe
windows10-1703-x64
10VenomRAT_v...64.exe
windows10-1703-x64
10VenomRAT_v...86.exe
windows10-1703-x64
10VenomRAT_v...on.dll
windows10-1703-x64
1VenomRAT_v...ls.dll
windows10-1703-x64
1VenomRAT_v...er.exe
windows10-1703-x64
7VenomRAT_v...ib.dll
windows10-1703-x64
1VenomRAT_v...Ip.dll
windows10-1703-x64
1VenomRAT_v...ib.dll
windows10-1703-x64
1VenomRAT_v...in.url
windows10-1703-x64
1VenomRAT_v...ng.url
windows10-1703-x64
1VenomRAT_v...rd.dll
windows10-1703-x64
1VenomRAT_v...re.dll
windows10-1703-x64
1VenomRAT_v...et.dll
windows10-1703-x64
1Analysis
-
max time kernel
189s -
max time network
288s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
16-05-2024 22:30
Behavioral task
behavioral1
Sample
VenomRAT_v6.0.3/Plugins/Miscellaneous.dll
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
VenomRAT_v6.0.3/Plugins/Netstat.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
VenomRAT_v6.0.3/Plugins/Options.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
VenomRAT_v6.0.3/Plugins/ProcessManager.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
VenomRAT_v6.0.3/Plugins/Recovery.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
VenomRAT_v6.0.3/Plugins/Regedit.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
VenomRAT_v6.0.3/Plugins/RemoteCamera.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
VenomRAT_v6.0.3/Plugins/RemoteDesktop.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
VenomRAT_v6.0.3/Plugins/ReverseProxy.dll
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
VenomRAT_v6.0.3/Plugins/SendFile.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
VenomRAT_v6.0.3/Plugins/SendMemory.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
VenomRAT_v6.0.3/Plugins/Stealer.dll
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
VenomRAT_v6.0.3/Plugins/hvnc.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
VenomRAT_v6.0.3/Plugins/x64/SQLite.Interop.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
VenomRAT_v6.0.3/Plugins/x86/SQLite.Interop.dll
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
VenomRAT_v6.0.3/SMDiagnostics.dll
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
VenomRAT_v6.0.3/Server.Properties.Resources.ps1
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
VenomRAT_v6.0.3/Server.Properties.Resources.resources.ps1
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
VenomRAT_v6.0.3/Stub/ClientAny.exe
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
VenomRAT_v6.0.3/Stub/Clientx64.exe
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
VenomRAT_v6.0.3/Stub/Clientx86.exe
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
VenomRAT_v6.0.3/System.IO.Compression.dll
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
VenomRAT_v6.0.3/System.ServiceModel.Internals.dll
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
VenomRAT_v6.0.3/Venom RAT + HVNC + Stealer + Grabber.exe
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
VenomRAT_v6.0.3/Vestris.ResourceLib.dll
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
VenomRAT_v6.0.3/cGeoIp.dll
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
VenomRAT_v6.0.3/dnlib.dll
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
VenomRAT_v6.0.3/gbpast - Login.url
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
VenomRAT_v6.0.3/learn all kind of hacking.url
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
VenomRAT_v6.0.3/netstandard.dll
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
VenomRAT_v6.0.3/protobuf-net.Core.dll
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
VenomRAT_v6.0.3/protobuf-net.dll
Resource
win10-20240404-en
General
-
Target
VenomRAT_v6.0.3/Server.Properties.Resources.resources.ps1
-
Size
27KB
-
MD5
87e6db607c89f5fcf8465995f84d2aec
-
SHA1
8a81e3e5f963a85c85187d1d23fa9b18144d8090
-
SHA256
ff90e7f24c52af8cc22ab93484a90edb26f92bb0cd07f5f9f3e11565e516b38a
-
SHA512
2366206e46ac317588b6b8ea3a1b511d8fa13fb4234585dafd396c740105d4916768c294d90c24a60301ac2ff582d728eaa8e6661bd6b4d7c77f14db2f821f05
-
SSDEEP
384:eokwkokwbokwvokwMokw3okwpokw2okwvokwmokwMokwOokw4okwtokw3okwcokU:Ub4+djF
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 3280 powershell.exe 3280 powershell.exe 3280 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3280 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\VenomRAT_v6.0.3\Server.Properties.Resources.resources.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a