Behavioral task
behavioral1
Sample
30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe
Resource
win7-20240729-en
General
-
Target
30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787
-
Size
74KB
-
MD5
7dc58fd2226e2c9f56efc92b26ba2ed1
-
SHA1
dbe8dc5fc568b4f24cc3a2a8e4a11cf38c217dd2
-
SHA256
30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787
-
SHA512
bb856bbec7b98c7e729e5eb312b2a7061de0382d65f1a1d47ad1bee965f3aa63a84be5ccc58c9308a8bedd43893b549adb41df22381f629c4a4c7926f011bcf6
-
SSDEEP
1536:UUUPcxVteCW7PMVabajIFH1bf/QdLJCQzcWLVclN:UUmcxV4x7PMVAacH1bf4gQvBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
94.156.69.160:2020
cwddfxajfbhwjug
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample family_asyncrat -
Asyncrat family
-
resource yara_rule sample VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787
Files
-
30eb281a512774aba2ec5baa2c1acf3670f9ef943c48a2005625e7a02d09d787.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ