Behavioral task
behavioral1
Sample
ClientAny.exe
Resource
win7-20240704-en
General
-
Target
ClientAny.exe
-
Size
74KB
-
MD5
04977e6f52297b61a6fffa8e5e236841
-
SHA1
7776a6811c5dd56540a085c48cccf7b900ae03f0
-
SHA256
1a5910ce3b26031816250a63e0c2d77d14b73aafa45623d01f1d2de9bd46bdbe
-
SHA512
94f82379afc8c1bb624b2d1b9e55388ef6b2f3dd68641004d7a362e62ff349420e2cc5b9c6d20e5300a2e80c644e1e3ea4f2a8fb3e4d652b586bc80fa805bd63
-
SSDEEP
1536:zUEkcx4VHsC0SPMVrmLghvICH1bR/YybaD1Qzc6LVclN:zUxcx4GfSPMVqchHH1bRniQrBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
37.130.98.195:1604
pzzetmovggsvacpmxy
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
ClientAny.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ