Behavioral task
behavioral1
Sample
1a5910ce3b26031816250a63e0c2d77d14b73aafa45623d01f1d2de9bd46bdbe.exe
Resource
win7-20240705-en
General
-
Target
04977e6f52297b61a6fffa8e5e236841.bin
-
Size
35KB
-
MD5
f45b397bfac9ac035d46dd82f0c60382
-
SHA1
6c819e4a51a69f26e6c45c322ca3b04500e01ca1
-
SHA256
ed683a5546014ce6e332d0e4663bf7eb0c66058192e95c63b72c712d42b183d9
-
SHA512
d2a9da1fbedac4acc2e22d80cd5b804e2ff775fa2d65f38e0fbdcc0319cb9aa94e29f7a26cabfbc7d0f7332a3891e1b0f7f86ef937a7739e684b474eb2631858
-
SSDEEP
768:tML8eoHrbcUOtkQ8oFNMg0bsDII8Cj8hVeCZqWwXOj:tg8eoHrbUtkQH7MgPtjOeiq7Oj
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
37.130.98.195:1604
pzzetmovggsvacpmxy
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/1a5910ce3b26031816250a63e0c2d77d14b73aafa45623d01f1d2de9bd46bdbe.exe family_asyncrat -
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1a5910ce3b26031816250a63e0c2d77d14b73aafa45623d01f1d2de9bd46bdbe.exe
Files
-
04977e6f52297b61a6fffa8e5e236841.bin.zip
Password: infected
-
1a5910ce3b26031816250a63e0c2d77d14b73aafa45623d01f1d2de9bd46bdbe.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ