Behavioral task
behavioral1
Sample
Unlock all.exe
Resource
win11-20240419-en
General
-
Target
Unlock all.exe
-
Size
63KB
-
MD5
b23de82b6824f8e38b2bed79f3cf83fa
-
SHA1
761d9fbc81d75a589bbe493dbae7bbcd7d042dfa
-
SHA256
e19a4a36276e501ee70068b365480f122b3b0e96cba020ca7def1322a716dbe5
-
SHA512
cd39cdc7bbb80cad166ecee4c4df7d9866d921410b208dfc0ce0de60a3cbc2076108b69682ce4d10c2ae30ee62eeb672485db232fb44ad53307018cb66cdce75
-
SSDEEP
1536:ShODHQtSfGaf19MEDyTVtWi+GbbXd8GSDpqKmY7:ShODHQtSzfTrDCtcGbbX8gz
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
127.0.0.1:4449
127.0.0.1:60332
76.38.145.130:4449
76.38.145.130:60332
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
ffff.exe
-
install_folder
%AppData%
Signatures
Files
-
Unlock all.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ