Analysis
-
max time kernel
299s -
max time network
300s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-08-2024 07:05
General
-
Target
Client2.exe
-
Size
74KB
-
MD5
f90244de8f492bcbfdf05b369bb31857
-
SHA1
b9007602b8c83ffc2aef288c760b3e3d832a84ab
-
SHA256
e5d1d158da5a18f89e2855722fdf111971a6b760100cfe0f22bdf70dd34466b5
-
SHA512
4d1d3e94108f9ff649b7f4174e2fae36737b18df90df4af128e01e9813454c24f6a82605a1df957bf18c50a0874feadd6891e5351727a0ab8232f07e4b2e80e3
-
SSDEEP
1536:UUUPcxVteCW7PMVP1yievkIXH1b1/LPNQzcWLVclN:UUmcxV4x7PMVdyzZH1b1JQvBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
193.161.193.99:1194
Mutex
usuyrpldfcm
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe 3780 Client2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3780 Client2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3780 Client2.exe