Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 20:00
Behavioral task
behavioral1
Sample
97de4bc04461280f11316077a41083e0.exe
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
General
-
Target
97de4bc04461280f11316077a41083e0.exe
-
Size
74KB
-
MD5
97de4bc04461280f11316077a41083e0
-
SHA1
3b4165f4d408e0f330c637554554b27924535178
-
SHA256
546c2ba68b57f679a7004f438b1822d90a8adddf681d99858cb7140f29b77a2f
-
SHA512
5ec0682c296a70a4cfc4cb6710926d1987308e75f5b2446c815e3b2cc8577cf25242d788031bf7ea8324506365ade24a721f934b8b089889055d98de5697bf64
-
SSDEEP
1536:PUD0cxVGlCBiPMVK07RhCIQH1bM/Pz8oNQzcaLVclN:PUAcxVMWiPMVHNhsH1bM3z8iQLBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
127.0.0.1:80
45.141.151.163:4449
45.141.151.163:80
Mutex
kijgzzvakwgjgyonlhe
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe 4108 97de4bc04461280f11316077a41083e0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4108 97de4bc04461280f11316077a41083e0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4108 97de4bc04461280f11316077a41083e0.exe