Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 19:07
Behavioral task
behavioral1
Sample
f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe
Resource
win7-20240705-en
windows7-x64
5 signatures
150 seconds
General
-
Target
f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe
-
Size
73KB
-
MD5
f74e8a071b955f39231c4c209e30f1a3
-
SHA1
594998b0b11979ce447911a3c35e3e93ae7ca26d
-
SHA256
f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308
-
SHA512
2bba73f8e75b2c1d37d885a727fca8c6afc70bbb7ad8ba33657fc351760bdc9fabbe0e9e72d7571a7696bed6557371aa3c8f4bdb606f3c0078c047ce866b838a
-
SSDEEP
1536:LUkPcxVteCW7PMVee9VdQkhDIyH1bf/06sDNQzc33VclN:LU2cxV4x7PMVee9VdQgH1bfRsRQylY
Malware Config
Extracted
Family
asyncrat
Version
VFPower-[RAT-HVNC]
Botnet
Default
C2
110.42.248.7:4449
Mutex
mzmycyinygwybeaeb
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4988-1-0x0000000000340000-0x0000000000356000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exepid process 4988 f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe 4988 f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe 4988 f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe 4988 f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe 4988 f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe 4988 f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe 4988 f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe 4988 f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exedescription pid process Token: SeDebugPrivilege 4988 f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exepid process 4988 f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe"C:\Users\Admin\AppData\Local\Temp\f03e941d050826b288bf5bfb36def419d4e89bba8976ead214db405585af5308.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4988