Behavioral task
behavioral1
Sample
94fada921a79c422e6dbf75eeca7429690d75901b5ef982a44874971b38708a0.exe
Resource
win7-20240221-en
General
-
Target
94fada921a79c422e6dbf75eeca7429690d75901b5ef982a44874971b38708a0.exe
-
Size
73KB
-
MD5
26125c571d6225959832f37f9ac4629a
-
SHA1
ed7af3c41eaab7b10a2639f06212bd6ee0db6899
-
SHA256
94fada921a79c422e6dbf75eeca7429690d75901b5ef982a44874971b38708a0
-
SHA512
172b72f2a92c5ea119ee9369c91f6fb4431efc95fd7c1dad65c1d45886ae17025e55d7a2bf9bfbae6f163928799f0b79dc874ed19383aff281f5466a81b590d4
-
SSDEEP
1536:CSUEkcxNYungvHZDJ/SkXizIqksbLvPMw6/eqmmRhdWVH1bfbv3SrwzUQbVclN:CSUxcxNYungPZDJ/SkXizIqks/vPMwZq
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Default
85.209.133.18:4545
tdipywykihsjieff
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule sample family_asyncrat -
Asyncrat family
-
Detects executables attemping to enumerate video devices using WMI 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 94fada921a79c422e6dbf75eeca7429690d75901b5ef982a44874971b38708a0.exe
Files
-
94fada921a79c422e6dbf75eeca7429690d75901b5ef982a44874971b38708a0.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ