Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 18:13
Behavioral task
behavioral1
Sample
tr.exe
Resource
win10-20240404-en
5 signatures
150 seconds
General
-
Target
tr.exe
-
Size
74KB
-
MD5
297a7df52e1057b2205815014c641b22
-
SHA1
72c2dd4a8ddd8dafd78bcbd4414f45e14c512a0e
-
SHA256
c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02
-
SHA512
f774d69e212bdc1b7fd72fec6ea216e576415fa685e416488a970bbc65239f39e8af633ac2325cc9eb165d8042af6073d7bd5eb92b1b2971271c55960dba2b23
-
SSDEEP
1536:PUk0cxVGlCBiPMVB53pIZl3H1bI/lQzcaLVclN:PURcxVMWiPMV7sl3H1bI9QLBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
Mutex
laegpkrxtpvxpx
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/73rUA0XA
aes.plain
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 17 pastebin.com 16 pastebin.com -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe 1160 tr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1160 tr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1160 tr.exe