Behavioral task
behavioral1
Sample
d93711daa1ff0f3b63df017fbfd1d2f5bfe264fd77809fe23640614ecb5cd36f.exe
Resource
win7-20240705-en
General
-
Target
d93711daa1ff0f3b63df017fbfd1d2f5bfe264fd77809fe23640614ecb5cd36f
-
Size
140KB
-
MD5
3cac83c912bfeb780fd1139fd0e7ebb5
-
SHA1
879031d44a0d018fe96179fdc5af705b0dcc511f
-
SHA256
d93711daa1ff0f3b63df017fbfd1d2f5bfe264fd77809fe23640614ecb5cd36f
-
SHA512
cfbd17a958bceaaea738d08d4c5c62ca2001bee9ffaca00de495159314a8f46c182f1b9abf81188bc690c923d3a4cb3b4981f8a520772dc5d04f8338935240fc
-
SSDEEP
3072:PU0cxC6e2mPMVqe9VdQsH1bf+ufQ2nFQY:Poe2mPMVqaesVbnxy
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
82.64.69.214:4449
fyhdjsvxoqnipyj
-
delay
1
-
install
true
-
install_file
mssconfigs.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample family_asyncrat -
Asyncrat family
-
resource yara_rule sample VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d93711daa1ff0f3b63df017fbfd1d2f5bfe264fd77809fe23640614ecb5cd36f
Files
-
d93711daa1ff0f3b63df017fbfd1d2f5bfe264fd77809fe23640614ecb5cd36f.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ