Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20240508-en
General
-
Target
Client.exe
-
Size
63KB
-
MD5
a3e11000168ec850c83c943edff48b11
-
SHA1
b408faf89cf7300a1550ab6b18d6c40e8bab4ded
-
SHA256
d4ac15390713302556e3c6ea4fcf08fdf595982b2c56563a5a242572ece70f1e
-
SHA512
1cf35e17cad47e769d513e01461879d0a52d71776044b0946d6672a637bfd9a8bbbb98075bade703df85b74263ae1c2cb026c347d1cc6524457d88b52a42a294
-
SSDEEP
768:NhNpSSnt7iPDVoiM9J2OcXveeObMbNqV1+RSCv7mqb2nIpwH1oOptahPGeDpqKYC:Lpt8OreeiIVrGbbXwgGeDpqKmY7
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
127.0.0.1:2000
127.0.0.1:3069
taking-headquarters.gl.at.ply.gg:2000
taking-headquarters.gl.at.ply.gg:3069
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ