Analysis
-
max time kernel
118s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 20:26
Behavioral task
behavioral1
Sample
3e1fb505c7c99ed8b0f16f1e49390fa0N.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
120 seconds
General
-
Target
3e1fb505c7c99ed8b0f16f1e49390fa0N.exe
-
Size
74KB
-
MD5
3e1fb505c7c99ed8b0f16f1e49390fa0
-
SHA1
0bc6ddd2c8d02f3cd55a038e3033e658db1ad4f9
-
SHA256
482dd969856ee4ec5f24be4c2d9011652f43d96142da07b8aefd80f008ca405e
-
SHA512
0db3ced4ad892fe4cf32ca4c964f3a18693b5901f607fd5a6bb5987bd1529f7d53295fbcf83752549d95f03d32b56ef4348e70644baecb526ff4370d38a8d7cc
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/lI00hQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bf9uhQYBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
eowiizafqjywek
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2628-1-0x0000000000E70000-0x0000000000E88000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
3e1fb505c7c99ed8b0f16f1e49390fa0N.exepid process 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3e1fb505c7c99ed8b0f16f1e49390fa0N.exedescription pid process Token: SeDebugPrivilege 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
3e1fb505c7c99ed8b0f16f1e49390fa0N.exepid process 2628 3e1fb505c7c99ed8b0f16f1e49390fa0N.exe