Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 18:45

General

  • Target

    58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe

  • Size

    78KB

  • MD5

    9e75fe5e60c15dd6b76e075516968cc3

  • SHA1

    fdb181a276c5d02ebc87fe302a4a61feddbeab59

  • SHA256

    58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a

  • SHA512

    68b32885cc715ba8f8c0d3deda2174ebc6f02bc7113bd61ad6b8ef9b8349bf5290882a674ad5322b3a512b409d128e4d5e3a909d4311434d932296579c832cba

  • SSDEEP

    1536:SUEkcx4VHsC0SPMVw4Y0hSYYYHYYYYYYYYYZKYFYY6MYY99bzYYt8Iah1bW/6hzv:SUxcx4GfSPMVwf0hh1bWCZkQ/AbY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

54.153.17.157:14445

Mutex

rpujporiumcisxsdyop

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe
    "C:\Users\Admin\AppData\Local\Temp\58cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-0-0x00007FFE45553000-0x00007FFE45555000-memory.dmp

    Filesize

    8KB

  • memory/1684-1-0x0000000000420000-0x0000000000438000-memory.dmp

    Filesize

    96KB

  • memory/1684-3-0x00007FFE45550000-0x00007FFE46011000-memory.dmp

    Filesize

    10.8MB

  • memory/1684-4-0x00007FFE45553000-0x00007FFE45555000-memory.dmp

    Filesize

    8KB

  • memory/1684-5-0x00007FFE45550000-0x00007FFE46011000-memory.dmp

    Filesize

    10.8MB