Behavioral task
behavioral1
Sample
4552-3549-0x0000000000450000-0x0000000000468000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4552-3549-0x0000000000450000-0x0000000000468000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
4552-3549-0x0000000000450000-0x0000000000468000-memory.dmp
-
Size
96KB
-
MD5
d5dce5787ac21314ff1406d0c285fb1b
-
SHA1
ab27a8a50e80513d2f243759bd68728793a5e55d
-
SHA256
c4f0febf0a03f00a21004c47360e94bb4dde18f1994c3a3b341862c28aac1805
-
SHA512
fdd70645c97e8a91446d7e714c1a3dcf18973007780024ecf975b1100100b8f83c8101dba420ecd0709adf1eb1c2e0f1d453ddafae390009f33dfb050bff12d3
-
SSDEEP
1536:cUKkcx9pXCTyPMVWe9VdQuDI6H1bf/ULlqQQzcmLVclN:cUDcx958yPMVWe9VdQsH1bfsLlTQ/BY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
154.216.20.242:4449
shoogvdlxg
-
delay
1
-
install
true
-
install_file
$77pop2.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4552-3549-0x0000000000450000-0x0000000000468000-memory.dmp
Files
-
4552-3549-0x0000000000450000-0x0000000000468000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ