General
-
Target
lmaooo.exe
-
Size
74KB
-
MD5
3540e8dae2f1699393407da8ec1b6971
-
SHA1
157592b1a66078e940091ea77cdc13dff862d2a1
-
SHA256
ef27240ce5015fe3f80a8ee2dba9fd05ea049589bdf0077ea2405c2f129b58cc
-
SHA512
68b450832fa1001329947ca92caba22b9302d0a1e2c8448e5b3de7966d9fe0b62d394c5a4d7dfdbc8eeddd9902db729a969962a73a74e92b41247c9450fde0e6
-
SSDEEP
1536:mUUPcxVteCW7PMVxrW7YdIHH1b9/tmQzcUQVclN:mUmcxV4x7PMVxrW9H1b9QQdKY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
haahdasdkhdansd
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
lmaooo.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ