General
-
Target
xff.cmd
-
Size
6KB
-
Sample
240523-wpqfpsbc87
-
MD5
7b90a6964decffe69d5a3f43d4285498
-
SHA1
9e2982f4c58624952f26322fd7eff379af540586
-
SHA256
b84eb711989fbe9e0ff3ec874b5a0dac33655d27929fdce619ea94a35dca8953
-
SHA512
f95ac4691adb65fe56c981567c2ea79bb786f38305ae0280da1c41f48c7f34d72fdc22737835096046590036353ec33295f1c6378987f1d9354356accd650b68
-
SSDEEP
96:Svgs1WudsEONjKlXPi3+mB0AT1DLkHjXTIo6wwPtsRmNga74vGyr:SN0ysEOKjMlTxiDEwqtLNga0N
Static task
static1
Behavioral task
behavioral1
Sample
xff.cmd
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
xff.cmd
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
xff.cmd
Resource
win10v2004-20240426-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
xvern429.duckdns.org:8890
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
xff.cmd
-
Size
6KB
-
MD5
7b90a6964decffe69d5a3f43d4285498
-
SHA1
9e2982f4c58624952f26322fd7eff379af540586
-
SHA256
b84eb711989fbe9e0ff3ec874b5a0dac33655d27929fdce619ea94a35dca8953
-
SHA512
f95ac4691adb65fe56c981567c2ea79bb786f38305ae0280da1c41f48c7f34d72fdc22737835096046590036353ec33295f1c6378987f1d9354356accd650b68
-
SSDEEP
96:Svgs1WudsEONjKlXPi3+mB0AT1DLkHjXTIo6wwPtsRmNga74vGyr:SN0ysEOKjMlTxiDEwqtLNga0N
Score10/10-
Blocklisted process makes network request
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-