General
-
Target
update.exe
-
Size
6.6MB
-
Sample
240708-ddrkhs1eph
-
MD5
6d1826e57f8473dd421f0c5e8ccd8e5a
-
SHA1
5c8ee34d2e083d82747e159eea938eed6180ec9e
-
SHA256
6c69bc74f95eba396347160cfadc919285b6ef8278adf3d800d21a964e5ab103
-
SHA512
c3eaf2fb84100df35cbffbdb0216f55f56859a3f4f339feb8bddd19cf68d5e55e31284295165ff21926106d21e98090ea6027b11946b632c3cd11b96ebfe3776
-
SSDEEP
98304:xCI8oJo1hZlzb71QGQCPDbZfxz87le5BLoHLSLgj8NnJwFDDEy2nZsBJ1nCkKQg:UIbJofdQmRKuErSEEJwdFvZnCkK
Behavioral task
behavioral1
Sample
update.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
update.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
ujhn.duckdns.org:8520
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
update.exe
-
Size
6.6MB
-
MD5
6d1826e57f8473dd421f0c5e8ccd8e5a
-
SHA1
5c8ee34d2e083d82747e159eea938eed6180ec9e
-
SHA256
6c69bc74f95eba396347160cfadc919285b6ef8278adf3d800d21a964e5ab103
-
SHA512
c3eaf2fb84100df35cbffbdb0216f55f56859a3f4f339feb8bddd19cf68d5e55e31284295165ff21926106d21e98090ea6027b11946b632c3cd11b96ebfe3776
-
SSDEEP
98304:xCI8oJo1hZlzb71QGQCPDbZfxz87le5BLoHLSLgj8NnJwFDDEy2nZsBJ1nCkKQg:UIbJofdQmRKuErSEEJwdFvZnCkK
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Loads dropped DLL
-