Overview
overview
10Static
static
10Venom-Rat-...0.html
windows7-x64
1Venom-Rat-...0.html
windows10-2004-x64
1Venom-Rat-...0.html
windows7-x64
1Venom-Rat-...0.html
windows10-2004-x64
1Venom-Rat-...il.dll
windows7-x64
1Venom-Rat-...il.dll
windows10-2004-x64
1Venom-Rat-...at.dll
windows7-x64
1Venom-Rat-...at.dll
windows10-2004-x64
1Venom-Rat-...me.dll
windows7-x64
1Venom-Rat-...me.dll
windows10-2004-x64
1Venom-Rat-...ed.exe
windows7-x64
8Venom-Rat-...ed.exe
windows10-2004-x64
8Majid Z Hacker.exe
windows7-x64
8Majid Z Hacker.exe
windows10-2004-x64
8Majid Z Hacker.exe
windows7-x64
10Majid Z Hacker.exe
windows10-2004-x64
10Windows Program.exe
windows7-x64
7Windows Program.exe
windows10-2004-x64
7script.vbs
windows7-x64
10script.vbs
windows10-2004-x64
10windows registry.exe
windows7-x64
10windows registry.exe
windows10-2004-x64
10firewall.exe
windows7-x64
8firewall.exe
windows10-2004-x64
Venom Cracked.exe
windows7-x64
1Venom Cracked.exe
windows10-2004-x64
1Venom-Rat-...er.exe
windows7-x64
1Venom-Rat-...er.exe
windows10-2004-x64
1Venom-Rat-...ed.exe
windows7-x64
10Venom-Rat-...ed.exe
windows10-2004-x64
10Majid Z Ha...te.exe
windows7-x64
10Majid Z Ha...te.exe
windows10-2004-x64
10General
-
Target
VenomRatCrackedmain.zip
-
Size
33.8MB
-
Sample
240531-pphmjahe83
-
MD5
c8fba8be27bdfbe60de014aaecc83a68
-
SHA1
8c9529de89bd53491e10c3e8c7b35c0d4400e6d1
-
SHA256
f911a357abf083c321d7240e1070b470c9d2a64c1503700dbec45980c88c0aa4
-
SHA512
dfab827a10867022a5833f1af71e5abb3915f792326956ed3859b57b9ef83f6d5cc1b87ffd34c827878289fe581968c75d5f279930ee023ea6496730a86d3c15
-
SSDEEP
786432:Gm20c7pW2y9SIE9lzOG2WMJx+8PxQ4I+zFZx4vFqnb:FqKSIEztoJQ4nzFn4Fqnb
Behavioral task
behavioral1
Sample
Venom-Rat-Cracked--main/Clients/Morpheus@DESKTOP-ALON1A1_367DDFD/Logs/10-31-2020.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Venom-Rat-Cracked--main/Clients/Morpheus@DESKTOP-ALON1A1_367DDFD/Logs/10-31-2020.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Venom-Rat-Cracked--main/Clients/Sam@DESKTOP-1HP3JNB_440CF1F/Logs/05-17-2020.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Venom-Rat-Cracked--main/Clients/Sam@DESKTOP-1HP3JNB_440CF1F/Logs/05-17-2020.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Venom-Rat-Cracked--main/Mono.Cecil.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Venom-Rat-Cracked--main/Mono.Cecil.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Venom-Rat-Cracked--main/Mono.Nat.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Venom-Rat-Cracked--main/Mono.Nat.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Venom-Rat-Cracked--main/VelyseTheme.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Venom-Rat-Cracked--main/VelyseTheme.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Majid Z Hacker.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Majid Z Hacker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Majid Z Hacker.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Majid Z Hacker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Windows Program.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Windows Program.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
script.vbs
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
script.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
windows registry.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
windows registry.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
firewall.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
firewall.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
Venom Cracked.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Venom Cracked.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Venom-Rat-Cracked--main/Venom Binder.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Venom-Rat-Cracked--main/Venom Binder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Venom-Rat-Cracked--main/Venom Software RAT Activated Cracked.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Venom-Rat-Cracked--main/Venom Software RAT Activated Cracked.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
Majid Z Hacker Website.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
Majid Z Hacker Website.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
njrat
0.7d
HacKed
hackerguru.duckdns.org:6666
8b3c87226fd3a4e8b8191141ea7a593c
-
reg_key
8b3c87226fd3a4e8b8191141ea7a593c
-
splitter
|'|'|
Extracted
quasar
-
reconnect_delay
5000
Targets
-
-
Target
Venom-Rat-Cracked--main/Clients/Morpheus@DESKTOP-ALON1A1_367DDFD/Logs/10-31-2020.html
-
Size
216B
-
MD5
30b4a82882d5ca65e0acbc7f9d53de96
-
SHA1
ebd101d932923595c5b4fc3b56d74f866c19a50a
-
SHA256
dab5e41df2ffbe1ee3c137427047112bf47031a8805531cf8013f0b3bd28cc2e
-
SHA512
8e4dd015b50b45fb891b6dd74d42df8702bf070291d7fbdde1459c11cec5594c0cf461b713b573ba59e158b8e486329a1dcc03b8dcf5afd0c4c7194d662c626a
Score1/10 -
-
-
Target
Venom-Rat-Cracked--main/Clients/Sam@DESKTOP-1HP3JNB_440CF1F/Logs/05-17-2020.html
-
Size
265B
-
MD5
9b89272b3c6a70ecffdb0da78e609110
-
SHA1
ebf8310a853858f8082de7b63caba16d8313261d
-
SHA256
6e9e5ff4b4d55e4d40b4e2a38cda9e82efd4f28b32d73e49d6ca49249a850a32
-
SHA512
5bb1448b33550f004dae06cb5eba413f9cba8724d6603475c00c586c97869292b629f1c0d76ab30ccb2fd682a2389aa3db369a88172a6c0aee561188ad306f02
Score1/10 -
-
-
Target
Venom-Rat-Cracked--main/Mono.Cecil.dll
-
Size
277KB
-
MD5
8df4d6b5dc1629fcefcdc20210a88eac
-
SHA1
16c661757ad90eb84228aa3487db11a2eac6fe64
-
SHA256
3e4288b32006fe8499b43a7f605bb7337931847a0aa79a33217a1d6d1a6c397e
-
SHA512
874b4987865588efb806a283b0e785fd24e8b1562026edd43050e150bce6c883134f3c8ad0f8c107b0fb1b26fce6ddcc7e344a5f55c3788dac35035b13d15174
-
SSDEEP
6144:iYOMWAEq+PAEwGQ9Xivs0s4EtS1Fv8jnLKdFvkPo2:AG+PpjQSHv8jA
Score1/10 -
-
-
Target
Venom-Rat-Cracked--main/Mono.Nat.dll
-
Size
40KB
-
MD5
bf929442b12d4b5f9906b29834bf7db1
-
SHA1
810a2b3c8e548d1df931538bc304cc1405f7a32b
-
SHA256
b33435ac7cdefcf7c2adf96738c762a95414eb7a4967ef6b88dcda14d58bfee0
-
SHA512
9fcfaf48bfe5455a466e666bafa59a7348a736368daa892333cefa0cac22bcef3255f9cee24a70ed96011b73abea8e5d3dbf24876cffa81e0b532df41dd81828
-
SSDEEP
768:yoVesKx0V2LpibQJxoKUDHj560aSX3zlJAO:lVespQibC+H56k3fF
Score1/10 -
-
-
Target
Venom-Rat-Cracked--main/VelyseTheme.dll
-
Size
51KB
-
MD5
52bfce7e8dc04712cd2091c12f126f77
-
SHA1
0b695c88d3abb7c69aefc9a6f5e82445e515ec43
-
SHA256
b332daac3b130051e8d2a5fd325d6d094ca1c9a602b45667855341f4cb9100ae
-
SHA512
0619e44efc0030d5fa18cff2bca8f89923a7caa2209ef63bfc3b48a6de00946ea676afb428bf26bac5f891901f42935222e2a64a959ff764fb4d84c746971db8
-
SSDEEP
768:fRbo8VVXLD92auFWwnDvL9yQfRchDX3cpYXKxEaXOZ4jXBTGCe3Tj3WjR:Jb/nLkx8Qqcps8EaXO8GCe3Tyl
Score1/10 -
-
-
Target
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
-
Size
10.1MB
-
MD5
4dabfeed4b250a3248714458ae370ca8
-
SHA1
6e215b2a20039a4dbde18579a1419a4eb10946ac
-
SHA256
eb23cbc820d2b8fdc0227b2e89274edf2671163cae40e0a9bb930b91c05ac3a9
-
SHA512
7ea826cf27da942ce2e9db4a800b3c247670a8fc260af8686d14c48583f38f14b935d5af282a3774a9811f0957ca7318dc883307254554e907f7cfb5f6419a4c
-
SSDEEP
196608:m6+0f/ylacMb5mCbClb12UK4RDx5gRIAL1xXPm68DwOHRR+kc4N4FmDdgW7NaREE:m0f/KacMbR2J2UKEdiRIAL1xXPCwkEn7
Score8/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
-
-
Target
Majid Z Hacker.exe
-
Size
462KB
-
MD5
a8a8d6f3b48466242959545235d1c9b6
-
SHA1
0c2d670dc3b3b07a2498756e1d46fd1fee53a621
-
SHA256
09d709640f6884d6b7e7501175cfdcc3724df07785c081c0e14b20cbcdf382ec
-
SHA512
09f08dd6026b2e24a05e20505723055deceffaba3d351dd49cdc934d038ef0796a3d8d481fe7734b3ec3ba80f4800994983441204dbc3f12baf4f637534a4796
-
SSDEEP
12288:6rs81bE0LfUk6XLbwxMY4R/3CDOpeYYhN7zjYC/M:6H5rh6XPbYuCDOpmPzjZM
Score8/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
-
-
Target
Majid Z Hacker.exe
-
Size
413KB
-
MD5
d546dc22ad3450598ab32de298a72a80
-
SHA1
6c0b509488bdb86a679a4499e6ebf276ac9d8ea1
-
SHA256
b29885d1b7a7710d0bb85861609520cc7bd53524ab5525cd9b9c47690f0103a2
-
SHA512
79e5bca20e23b0cff3d7d98003ae6d69d8932a75eeff23f31ec4c0aae93a02d41593c60d3a6fcb8a06600e21bfa7190210e4842bcba3ba8e9a7d62f344b48980
-
SSDEEP
12288:6+81qE0efXk6XLUwx7YfR43JDOpedYhN7zf+:6o5yU6XIGYqJDOpJPzf+
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
-
-
Target
Windows Program.exe
-
Size
356KB
-
MD5
470c1aaa600dfd81af4cfb23bee7490c
-
SHA1
17cc0969b22f293b9bab656da3c9e4e4f6a3dbd0
-
SHA256
438c6c0291603bd92a66731abcf32e478dc19093c1c0f3c75ee5117192913809
-
SHA512
9a9927ce72abab495474fcc153dc65fcbe15f46cd08e03e892f05b1ad2025d80301b40cf922fee9bbfb4cc2aeffe867a772bc381c1694289e13cf1fde591fbee
-
SSDEEP
6144:nuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLT/yXiJxKM0Z:u6Wq4aaE6KwyF5L0Y2D1PqLB6Z
Score7/10-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
-
-
Target
script.vbs
-
Size
1KB
-
MD5
77a4da4863ffcaba51ce05d3c632158d
-
SHA1
253f9a594a6ca3a7a23acb90f8dc81939215ba4b
-
SHA256
ecd586281fc4655e40108fcf118beeae3411c1c1176951a763e47fb66d2e421f
-
SHA512
ba215fa65a011f5841f5e92b4053895c13368e894817551a982ca3e821726b8bbb13616bca8781fed08f4c83528d0d3ac233fa1f3e14ad4253fdefd9a22253cf
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
windows registry.exe
-
Size
23KB
-
MD5
0e61e56cab42baa9ac421252c13809ed
-
SHA1
f058e2efd1181d5285eef36fa2bae9658ccc20f9
-
SHA256
6f788d9f8b51ba8321f1837e02d10c5d94efc74c7be26f734c34a4d602b8d1bc
-
SHA512
e5cd90240468d86f5230d1c9f7c355c32cdbf3b5a0c041914d009c8145d260f469f75cf28e2b307964c64b6c6255a6fc6e258b5bb6525b50824365227c38e624
-
SSDEEP
384:3oWSkWHa55BgDVRGipkItzY6vZg36Eh7FpmRvR6JZlbw8hqIusZzZPZ:QJuk9pHRpcnuS
Score10/10-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
-
-
Target
firewall.exe
-
Size
40KB
-
MD5
085242fc50844dc41d1966e620d3e121
-
SHA1
5e9a343256313938468d5d4fb92e39c5ef6f8c91
-
SHA256
180b8e0169f2c89d3b4f34d3ee5b26f5578211068be74cf9c2fd194d8cda9b3d
-
SHA512
3341c74802aa98ce2bd7b15d2921d3082110c62ee6d82df784cb610c1594d905c82c6ae79cf43d76f98db7a8a4951686898ba1dddeb9615fca6480ac6bb7887b
-
SSDEEP
768:6LY4BORYOvIqY4EoURZW/CtjZ7wPda7+WoSKD4+:6qIfoU/W/Ctt7w1mo
Score8/10-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
-
-
Target
Venom Cracked.exe
-
Size
12.1MB
-
MD5
750015e08a9409c80cd3837daebb970a
-
SHA1
bfd1122f8c459862717b0b7a50b7216fc2573880
-
SHA256
3c413ee4b07c531c891ac1852d3d1b6a60bdc92e549e9cf4744d4fe85ebb5de2
-
SHA512
f35938eac84d6084d9239977462c965bab95924895cd2b73e501a7d7c2ff400aaeaefbdc3302ac8f8c13cd49e22d19e95ef530cf1cc10f79f6ab62653021e5ac
-
SSDEEP
196608:vThKmURVoq/uR12RVoq/uR1bnhmdmARsDymuPP3m:PCd/i14d/i1bn0oAWdG3m
Score1/10 -
-
-
Target
Venom-Rat-Cracked--main/Venom Binder.exe
-
Size
3.5MB
-
MD5
d4fd9db0eb77efac83278a095c28e6aa
-
SHA1
f10c82e115ad196f9cac23a201f72b9a5256d0e1
-
SHA256
94dbdb36d17f7b5dc5d34763eefb877756bbeaedeb7d41bc35de9e6c03ba983c
-
SHA512
2666ab45d0d7a7a933f7f91a5e3e88894d637704e20b165a41d662425f9baddf5e442e1d75a4abd541e695f83c2315752b54064e146650e87db17f777ad27cac
-
SSDEEP
98304:g31LR0+MzOMmbeZVv6PGpctX70MAt3gJwBXQnU:gU+lMmbgTclqlgA
Score1/10 -
-
-
Target
Venom-Rat-Cracked--main/Venom Software RAT Activated Cracked.exe
-
Size
9.8MB
-
MD5
1947749a785b384a9bfe51d57c796ae9
-
SHA1
db986cb4503589a2319e596b799c878ec4d4a990
-
SHA256
6018e4099dca3d452ecc8fe34f5e6d00b2b43c5c21cdea1b4c53c7025376048a
-
SHA512
3e82f60c595a5fc25043729366137ea35f2037bf23b78248cf8946a2edb39c6af4c9159c9c5b6c876148ef8b06468d975a4f6e413319b6ebc9712920f3c5829e
-
SSDEEP
196608:w6+0f/ylacMb5mCbClb12UK4RDx5gRIAL1xXPm68DwOHRR+kc4N4FmDdgW7U:40f/KacMbR2J2UKEdiRIAL1xXPCwkEn3
Score10/10-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
-
-
Target
Majid Z Hacker Website.exe
-
Size
127KB
-
MD5
b4d0b69f3c391acca7128a66abd480f7
-
SHA1
8ccac1861f4c544c51a5c7d4a0fb32796ab30488
-
SHA256
349b87c3ebd55cab9daa375c468b62be416063af859a16bed78cf4bd06fb5c07
-
SHA512
9578df157aafc7740e12952d1abba08fa9e032fc73073e1787fffb7e24ce6963d98d7bdd4539297be0123626efdfccb63c7dea411d82ceef7bf6197ff2806ff1
-
SSDEEP
3072:iqRaMrUwmuvDWLcg0CmHmFXfy57jQtMrpGIXFb177dWVqu:inx1FWmxf87UIXpl7dWVR
Score10/10-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2