Behavioral task
behavioral1
Sample
dfe9397e7afa5e416a4827800d4dccbd7b835b22fe99911a647a7e39a1608aba.exe
Resource
win7-20240708-en
General
-
Target
dfe9397e7afa5e416a4827800d4dccbd7b835b22fe99911a647a7e39a1608aba
-
Size
497KB
-
MD5
a445d0fe9709f20aa55f213f430d2bf9
-
SHA1
1f929533e0057f48c75769fb2a912de259da14b7
-
SHA256
dfe9397e7afa5e416a4827800d4dccbd7b835b22fe99911a647a7e39a1608aba
-
SHA512
097b64d675acf5e6047af23233ad4c2a74b2c8a9cdaed63f633cb2e59f331d12262decb3835f40031a02bb5baef957b1831fdc7afe456788fa8f9d816efbed49
-
SSDEEP
6144:0XaWPMVW6BVb/4ADOMpkMQ2SAYUa/qqdhxMho:0Xaxt4AtB8A/abMe
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
blu
194.26.192.154:4449
blu
-
delay
1
-
install
true
-
install_file
system32.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample family_asyncrat -
Asyncrat family
-
resource yara_rule sample VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dfe9397e7afa5e416a4827800d4dccbd7b835b22fe99911a647a7e39a1608aba
Files
-
dfe9397e7afa5e416a4827800d4dccbd7b835b22fe99911a647a7e39a1608aba.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 426KB - Virtual size: 426KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ