Behavioral task
behavioral1
Sample
d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe
Resource
win7-20240729-en
General
-
Target
d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc
-
Size
74KB
-
MD5
dbf5f23f69303716a9dbf7b8f54d8521
-
SHA1
fb4a707a4e87cb938bb656d6e3e9ca4e6e23d407
-
SHA256
d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc
-
SHA512
27f7aabf3bf7e0e205b124a029245a10e91e3f306c82f27ccd229787559fe5b9bc08f27192eaf04b4d6aaf3f2c5f9e2eab99a253b6b70af2aef8eb40add5a66c
-
SSDEEP
1536:KUUPcxVteCW7PMVee9VdQuDI6H1bf/keKkQzc2BVclN:KUmcxV4x7PMVee9VdQsH1bf8KQ3rY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:13116
ycyhuvzrwnniemz
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample family_asyncrat -
Asyncrat family
-
resource yara_rule sample VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc
Files
-
d91a7b9126a877f33fcb931dce9a39d3205724a80d343e3f48e15cb6c78e0dfc.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ