Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:45
Behavioral task
behavioral1
Sample
58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe
-
Size
78KB
-
MD5
9e75fe5e60c15dd6b76e075516968cc3
-
SHA1
fdb181a276c5d02ebc87fe302a4a61feddbeab59
-
SHA256
58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a
-
SHA512
68b32885cc715ba8f8c0d3deda2174ebc6f02bc7113bd61ad6b8ef9b8349bf5290882a674ad5322b3a512b409d128e4d5e3a909d4311434d932296579c832cba
-
SSDEEP
1536:SUEkcx4VHsC0SPMVw4Y0hSYYYHYYYYYYYYYZKYFYY6MYY99bzYYt8Iah1bW/6hzv:SUxcx4GfSPMVwf0hh1bWCZkQ/AbY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
54.153.17.157:14445
Mutex
rpujporiumcisxsdyop
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
resource yara_rule behavioral1/memory/904-1-0x0000000000E40000-0x0000000000E58000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 904 58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe 904 58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe 904 58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe 904 58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe 904 58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe 904 58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe 904 58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe 904 58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 904 58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 904 58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe"C:\Users\Admin\AppData\Local\Temp\58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:904