Behavioral task
behavioral1
Sample
2d6a4155a7d17a0cfce4ad6e8571c674.exe
Resource
win7-20240704-en
General
-
Target
2d6a4155a7d17a0cfce4ad6e8571c674.exe
-
Size
74KB
-
MD5
2d6a4155a7d17a0cfce4ad6e8571c674
-
SHA1
9992d09dfac2f5445a7d29d2ab1d68b42608b348
-
SHA256
749911c61e23b64b45f28d453a8b70275f824092d8dab39ccc1e93464d26b450
-
SHA512
c6033f05cc9ec432dfe22a00aaf5461708f95954326a78c52f0c4617d50811a3ff30e99c300df28dea4530f2c952c1048d6f2c5415010b1a860c8570f45991ee
-
SSDEEP
1536:cOUt8cxqnHXC56PMVCUiLsiIyLH1bT/yDkuQzcaLVclN:cOUOcxq3O6PMV9iFLH1bT6IuQLBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
rufrwqqzhtx
-
delay
1
-
install
true
-
install_file
WinUpdate.exe
-
install_folder
%AppData%
Signatures
Files
-
2d6a4155a7d17a0cfce4ad6e8571c674.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ