Behavioral task
behavioral1
Sample
3ecd335862007c0a507c0c9426be4145ee8816b562fad2f80d585b0dd39cf444.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ecd335862007c0a507c0c9426be4145ee8816b562fad2f80d585b0dd39cf444.exe
Resource
win10v2004-20240802-en
General
-
Target
3ecd335862007c0a507c0c9426be4145ee8816b562fad2f80d585b0dd39cf444
-
Size
74KB
-
MD5
d1e14acc8e15993a0bc97536b210a689
-
SHA1
e5c971e6fa93812e96fe576b1f5e4dbb7f086669
-
SHA256
3ecd335862007c0a507c0c9426be4145ee8816b562fad2f80d585b0dd39cf444
-
SHA512
ee54def6efe7a999a4f813240f1202fa78118b57e8582e3c4223a0710472fced495d3174000db888f714ffcbb6fc4f3cb4437639c7d69e9f1dbf9d87ea208ec5
-
SSDEEP
1536:lU1kcxEb44MCqSPMVTFZMiFIlH1bM/wPbb6hb5jQzckxLVclN:lUOcxEbzM9SPMVTFZMiKH1bM4TbEbBQy
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
WIndows Session Manager
147.185.221.19:9999
asdfrhdhnzevhenaz
-
delay
2
-
install
true
-
install_file
WIndows Session Manager.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule sample family_asyncrat -
Asyncrat family
-
Processes:
resource yara_rule sample VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3ecd335862007c0a507c0c9426be4145ee8816b562fad2f80d585b0dd39cf444
Files
-
3ecd335862007c0a507c0c9426be4145ee8816b562fad2f80d585b0dd39cf444.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ