General
-
Target
mrr.bin
-
Size
364KB
-
Sample
240718-gw9qlaxdpj
-
MD5
20ed4eced64d1b806ceb823c135d1d33
-
SHA1
88afb4f4c0490d8ab1a2c7f31f5e5f5114d4b70d
-
SHA256
40134b68bf863594a5a030a9c961a4b87b405424ecaf4c8df7de7e47811f30c8
-
SHA512
8c1810f16ea1822130774741d1c4b8789aaec50d0a2f5db60e263a154c488b065ca2f427b7b76b74da7a6742aa0fe6f282275199a53f27803128db811f8fac8e
-
SSDEEP
6144:MmBy5jGDw2bay5eLOi6+zgH6561uOlMH9O1BNI:MQy5jGfbaDaza561XlMo7I
Static task
static1
Behavioral task
behavioral1
Sample
mrr.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
mrr.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
ujhn.duckdns.org:8520
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
mrr.bin
-
Size
364KB
-
MD5
20ed4eced64d1b806ceb823c135d1d33
-
SHA1
88afb4f4c0490d8ab1a2c7f31f5e5f5114d4b70d
-
SHA256
40134b68bf863594a5a030a9c961a4b87b405424ecaf4c8df7de7e47811f30c8
-
SHA512
8c1810f16ea1822130774741d1c4b8789aaec50d0a2f5db60e263a154c488b065ca2f427b7b76b74da7a6742aa0fe6f282275199a53f27803128db811f8fac8e
-
SSDEEP
6144:MmBy5jGDw2bay5eLOi6+zgH6561uOlMH9O1BNI:MQy5jGfbaDaza561XlMo7I
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-