Behavioral task
behavioral1
Sample
BYTER.exe
Resource
win7-20240508-en
General
-
Target
BYTER.exe
-
Size
74KB
-
MD5
cb0cb9b0481344fe9d4ba729fd378dcd
-
SHA1
989689fc787caaf872e8253f7fbb9217faef1213
-
SHA256
318cfba6bedb2b453226299ab81c408b6d493ab2b0d6940e99ead144ef687db0
-
SHA512
679bf4af003e6912ad2d6a353978e30cba4dcf2b7bebf28bf4c6adb6bc525d7fd719fcf2eb6ae2889a79633f958f07c6a7a648b9ea4c2740f3d167a84fd6bc02
-
SSDEEP
1536:AUC8cxMcpCn6PMV2e9VdQuDI6H1bf/EI3vQzcSMVclN:AUTcxMmw6PMV2e9VdQsH1bfR3vQfOY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
10.0.2.15:9090
10.0.2.15:52033
147.185.221.19:9090
147.185.221.19:52033
ukamffwfhwrbbir
-
delay
1
-
install
true
-
install_file
Steam.exe
-
install_folder
%AppData%
Signatures
Files
-
BYTER.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ