Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 11:47
Behavioral task
behavioral1
Sample
efb0c31543ca816cd9a55cafd730224c.exe
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
efb0c31543ca816cd9a55cafd730224c.exe
-
Size
74KB
-
MD5
efb0c31543ca816cd9a55cafd730224c
-
SHA1
c6356391853cf207c0ff4de5a9cdaddc8d0af63a
-
SHA256
560917a6881bc30c1436f8fb95705b00645773aa091c46083a6cea3b00a0949b
-
SHA512
6bde891ab5ee9338e61a5fa7752d502d0311c2a9a0d45238792aa1cf07d50be141d80371c6c5a4119f8ddd755bd2c9fb3a904aeb77035cad259feba0854c6054
-
SSDEEP
1536:oUUPcxVteCW7PMVB5ZhOJIK11bk/HE/QzclLVclN:oUmcxV4x7PMVnZ011bkfE/QkBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
185.196.10.81:4449
Mutex
wrteyuiooo
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe 2752 efb0c31543ca816cd9a55cafd730224c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2752 efb0c31543ca816cd9a55cafd730224c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2752 efb0c31543ca816cd9a55cafd730224c.exe