Analysis
-
max time kernel
127s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2024 16:31
General
-
Target
server.exe
-
Size
74KB
-
MD5
f3824e9850d28d25460601d337621934
-
SHA1
557f4b1d615e650d8460171b86e2e860c4f91382
-
SHA256
3e00cf0db46eff8e2a3600dea67c6490b69acb0c7db49dce472b506a9a03ee79
-
SHA512
6754e19640341bf306de9ab4b6d6fee7d6b625149bdad4a6dca070dd2e680eee0ab3c5a0fdd06a875b494995372bc1d11f326e85ad7051a651f3ea1912561e7b
-
SSDEEP
1536:gUUPcxVteCW7PMVMrKrnYgIgH1bz/8sigQzcyLVclN:gUmcxV4x7PMVMrKrvH1bz0gQjBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
192.168.209.128:4449
Mutex
otzkziwhmtdbiw
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 644 server.exe 644 server.exe 644 server.exe 644 server.exe 644 server.exe 644 server.exe 644 server.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 644 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 644 server.exe