Behavioral task
behavioral1
Sample
cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe
Resource
win10v2004-20240802-en
General
-
Target
cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe
-
Size
74KB
-
MD5
4fb681131f7ac7824c4f0afd337986d9
-
SHA1
c746978c6c091d94f2bbd17b1ad5954c4306bece
-
SHA256
cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80
-
SHA512
b5c2c3f6b5fe4845c0462059d9177b0cf56a36fe528745a9ea7f27120fdf2184b44be4dc5195d9e0d98a5a5987b8bc212707b3b4cc5ada9203db61f9859f3868
-
SSDEEP
1536:EUo0cxhzjBCViPMVXOS0GIkH1b6/20AuQQzcqLVclN:EUlcxhzVCiPMVOkH1b6+/QbBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
100 RND
91.92.243.191:5401
6871a79e-e4f7-4fb3-ae38-dc20c1d657a0
-
delay
1
-
install
true
-
install_file
hyperhostvc.exe
-
install_folder
%AppData%
Signatures
Files
-
cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ