General
-
Target
sample.cmd
-
Size
111KB
-
Sample
240523-w8xdcscb23
-
MD5
934330a37a7b1380047366d135ff1423
-
SHA1
1cadd58c7e7475277d23b924b3dac8aad567bf44
-
SHA256
c2ab16802765ebcfe21f21aabd351c846bbea9140835c23579f9d0e26f9bdf2c
-
SHA512
844b523cb12393b97a9807fd4b5bd9b811a7482a4d9865a0b3c7ccdce889222671f86bd87cc8a0ec25abefe62d8e33a871434114847fea58bf8bc73bc411362a
-
SSDEEP
3072:/HPsUJ1lTMxqWITymQ57Leimw/gU0x1DzfsxciNpU3:XTWITymEeiWUxFy
Static task
static1
Behavioral task
behavioral1
Sample
sample.cmd
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sample.cmd
Resource
win10v2004-20240426-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
xvern429.duckdns.org:8890
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
sample.cmd
-
Size
111KB
-
MD5
934330a37a7b1380047366d135ff1423
-
SHA1
1cadd58c7e7475277d23b924b3dac8aad567bf44
-
SHA256
c2ab16802765ebcfe21f21aabd351c846bbea9140835c23579f9d0e26f9bdf2c
-
SHA512
844b523cb12393b97a9807fd4b5bd9b811a7482a4d9865a0b3c7ccdce889222671f86bd87cc8a0ec25abefe62d8e33a871434114847fea58bf8bc73bc411362a
-
SSDEEP
3072:/HPsUJ1lTMxqWITymQ57Leimw/gU0x1DzfsxciNpU3:XTWITymEeiWUxFy
Score10/10-
Async RAT payload
-
Blocklisted process makes network request
-