Behavioral task
behavioral1
Sample
0bafe977cd4fd7ff27917e0aed453c8af46b52992553c1a975a2b7f6d2823ac4.exe
Resource
win7-20240705-en
General
-
Target
0bafe977cd4fd7ff27917e0aed453c8af46b52992553c1a975a2b7f6d2823ac4
-
Size
74KB
-
MD5
60a2e12c26687be2c910159d0e324829
-
SHA1
f4aa9963bb15fd6a56f1da05fb51e80245010bec
-
SHA256
0bafe977cd4fd7ff27917e0aed453c8af46b52992553c1a975a2b7f6d2823ac4
-
SHA512
3dfebdf6bf65fa1d51f942a93362aeb7872f39de34836a2221075d6661ed2322c72fda8562e08e165d875ed19fcfb6c91daced5f820a50608ae5d108d5f13ed4
-
SSDEEP
1536:2RU98cxpeaC/zPMV2UT7a3I671bI/4ev1QzcR8VclN:8U+cxp7AzPMV8D71bIgetQY+Y
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
147.185.221.20:22308
147.185.221.20:9090
vfravbfpvqwqeb
-
delay
1
-
install
true
-
install_file
steam.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule sample family_asyncrat -
Asyncrat family
-
Processes:
resource yara_rule sample VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 0bafe977cd4fd7ff27917e0aed453c8af46b52992553c1a975a2b7f6d2823ac4
Files
-
0bafe977cd4fd7ff27917e0aed453c8af46b52992553c1a975a2b7f6d2823ac4.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ