Behavioral task
behavioral1
Sample
Client.exe
Resource
win10-20240404-en
General
-
Target
Client.exe
-
Size
74KB
-
MD5
3718329dd2893497c91d03b72cd73d2f
-
SHA1
573d3572c606ccf99b6334d58161a78279571ab2
-
SHA256
311d2b68a397798d0ef1ec158ffc67579584f41b2b0a166a34f1082a9abcad74
-
SHA512
740e5f785087ed821d84393c7b1de05767f9687dcc90a30ec73d5e418d26d72ea53a1a9f96b7c6858e6c51f80b976a912722fee97d6fa7cf65e5335a89b5b268
-
SSDEEP
1536:EUEkcx4VHsC0SPMV7e9VdQuDI6H1bf/hIAqQzc2LVclN:EUxcx4GfSPMV7e9VdQsH1bfZIAqQPBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
195.88.218.203:23546
blkudqobnjszdcvnpuw
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ