Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240704-en
General
-
Target
Client.exe
-
Size
73KB
-
MD5
b04fc8991793f99358d35be1427635ec
-
SHA1
91c491af03d2f01b071cc3caf6fbd5c0f754339f
-
SHA256
ac50f0971410af3fc6b2a147ebb6411ccf4ab586d7edfa5673129d6329602bf3
-
SHA512
870aa32ae71ad09baf9453628fe6eab35ea55b6911f991b540222e60162032bca7dbac927eb95a5606be0afbdbffa066f24dbde4088961f68b1296a76e9b3390
-
SSDEEP
1536:zUgzcxr7JcC4vPMV2e9VdQkhDIyH1bf/v5oT/Qzc33VclN:zUicxr7eDvPMV2e9VdQgH1bfp+QSlY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
fsjmmnvvtjlkiea
-
delay
1
-
install
false
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Client.exe
Files
-
Client.exe.exe windows:4 windows x64 arch:x64
Password: 8866
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ