Behavioral task
behavioral1
Sample
560917a6881bc30c1436f8fb95705b00645773aa091c46083a6cea3b00a0949b.exe
Resource
win7-20240215-en
General
-
Target
560917a6881bc30c1436f8fb95705b00645773aa091c46083a6cea3b00a0949b.exe
-
Size
74KB
-
MD5
efb0c31543ca816cd9a55cafd730224c
-
SHA1
c6356391853cf207c0ff4de5a9cdaddc8d0af63a
-
SHA256
560917a6881bc30c1436f8fb95705b00645773aa091c46083a6cea3b00a0949b
-
SHA512
6bde891ab5ee9338e61a5fa7752d502d0311c2a9a0d45238792aa1cf07d50be141d80371c6c5a4119f8ddd755bd2c9fb3a904aeb77035cad259feba0854c6054
-
SSDEEP
1536:oUUPcxVteCW7PMVB5ZhOJIK11bk/HE/QzclLVclN:oUmcxV4x7PMVnZ011bkfE/QkBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.196.10.81:4449
wrteyuiooo
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule sample family_asyncrat -
Asyncrat family
-
Detects executables attemping to enumerate video devices using WMI 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 560917a6881bc30c1436f8fb95705b00645773aa091c46083a6cea3b00a0949b.exe
Files
-
560917a6881bc30c1436f8fb95705b00645773aa091c46083a6cea3b00a0949b.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ