Behavioral task
behavioral1
Sample
05dd577e5a4241163858af4b8caee22e034e0c40282186a1e353b0f08a5e0c4f.exe
Resource
win7-20240705-en
General
-
Target
05dd577e5a4241163858af4b8caee22e034e0c40282186a1e353b0f08a5e0c4f
-
Size
74KB
-
MD5
3c7db79d6b80a7bdfad55a4e07892c2b
-
SHA1
3c2ac76a844a4dbf0a8cfcf9cd5e3583b69fb6bc
-
SHA256
05dd577e5a4241163858af4b8caee22e034e0c40282186a1e353b0f08a5e0c4f
-
SHA512
59c409f45d5b7c18e38a5e440e1872820531fcd9f5f6ef9059de2a3dc7e49c81dabd4c3cc066015d2fa25822ac8b21e99f37ee0d8f490611af4dfb85eefe5a43
-
SSDEEP
1536:EUEkcx4VHsC0SPMV7e9VdQuDI6H1bf/fxqQzc2LVclN:EUxcx4GfSPMV7e9VdQsH1bf3oQPBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
79.110.49.69:7979
xqpnltuqspxqtcbjrh
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule sample family_asyncrat -
Asyncrat family
-
Processes:
resource yara_rule sample VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 05dd577e5a4241163858af4b8caee22e034e0c40282186a1e353b0f08a5e0c4f
Files
-
05dd577e5a4241163858af4b8caee22e034e0c40282186a1e353b0f08a5e0c4f.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ