Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240708-en
General
-
Target
Client.exe
-
Size
74KB
-
MD5
0e8c91a41cec8198ac21b9f8169c246e
-
SHA1
62de2dc3c6d7f132d544c29e2546edbd1b642ec2
-
SHA256
65022e64adfb69a218849bf5c76b6d268e311e1d353328449f997c66cc528361
-
SHA512
40d95ee490fcd75735bd35bb27f229a576617b1dd3d82a8788e024f2c8fe11d74e4765d41539da16c9e9188644e0455cd39e62f44c660a3f408b797aa12cde9c
-
SSDEEP
1536:LUk0cxVGlCBiPMVye9VdQuDI6H1bf/+vqQzc+LVclN:LURcxVMWiPMVye9VdQsH1bfWvqQXBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
byttstvecomn
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/LwwcrLg4
Signatures
Files
-
Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ