Behavioral task
behavioral1
Sample
ngrok.exe
Resource
win7-20240903-en
General
-
Target
ngrok.exe
-
Size
74KB
-
MD5
7f79bdf9fe741fe446c056005a52fd8a
-
SHA1
dc7f0987c8e34303555682f3827537c70a0963e0
-
SHA256
9b5b73e916f04101f6bb33a5f1064e54bbaa04c1cf8efe9a40b7bf5deb18da6e
-
SHA512
dbcc16a8bc70e22f7073e7bd10b137eb7eb4430bbec6687c45d8e8cf203d35e23d8c554d9ef9f5e59613320b4fe5a312b37cb98a7a3686a18a7a93ff053888e3
-
SSDEEP
1536:QRU98cxpeaC/zPMV9fxraL2UIeH1bzKNm0Qzc7qVclN:mU+cxp7AzPMVz1kH1bz6Qu4Y
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Driver
13.229.3.203:19322
locsuccac
-
delay
1
-
install
true
-
install_file
ngrok.exe
-
install_folder
%AppData%
Signatures
Files
-
ngrok.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ