Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240708-en
General
-
Target
Client.exe
-
Size
114KB
-
MD5
29e928f1f16131ca36a3aae3467141de
-
SHA1
9b586f0d13236c3280e5b7b3b592309b296d7fff
-
SHA256
5e3758c19d761560431f8fd8302aa6d2061568cbed3dc0a20ad3d4f5da93a956
-
SHA512
3f4ab2b645ec82c9899061973edb92bc4ef4ef3663603dea0de3a37447b8b94577e1357f398bef02f1ce94260f53f25387de72d872a055d7a9482b1f1b256314
-
SSDEEP
3072:QUVcxhzVCiPMVSe9VdQsH1bf7ADzQL4KvYMC29TwaGwYSOeBY:QtCiPMVSaesVbUzaFzC2yK
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:6703
147.185.221.21:4449
147.185.221.21:6703
uiagdedifgkrgllefg
-
delay
1
-
install
true
-
install_file
dllhost.dat.exe
-
install_folder
%AppData%
Signatures
Files
-
Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ