Behavioral task
behavioral1
Sample
ad33c4b3814f7db554bf92897d3e2be54697082567f9afa60707f3f67a9492e7.exe
Resource
win7-20240704-en
General
-
Target
ad33c4b3814f7db554bf92897d3e2be54697082567f9afa60707f3f67a9492e7
-
Size
83KB
-
MD5
b1acbd3e8ecec9575b91b96402a84dd2
-
SHA1
5e717fa879da36f1610a0bd874c2e153f0ec78d9
-
SHA256
ad33c4b3814f7db554bf92897d3e2be54697082567f9afa60707f3f67a9492e7
-
SHA512
a3a4d893ccda651afe9b99aac661a7d76976cdbbd6bbc928996288763b4d479df6dfedcb72efd2247c36bf6f987b7951759dee59381258bbe2de53620b50da40
-
SSDEEP
1536:LUEkcx4VHsC0SPMVKUiLsiIynH1bo/wIQzcrLVclN:LUxcx4GfSPMVFiFnH1boFQSBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
95.142.46.3:4449
95.142.46.3:7000
zlgcqgmshzbvhurfz
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample family_asyncrat -
Asyncrat family
-
resource yara_rule sample VenomRAT -
Venomrat family
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad33c4b3814f7db554bf92897d3e2be54697082567f9afa60707f3f67a9492e7
Files
-
ad33c4b3814f7db554bf92897d3e2be54697082567f9afa60707f3f67a9492e7.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ