Overview
overview
10Static
static
10GMAIL/Gmail.exe
windows11-21h2-x64
3GMAIL/Leaf.xNet.js
windows11-21h2-x64
3Instagram VM.exe
windows11-21h2-x64
6Randome/La...p_.rar
windows11-21h2-x64
3LazyAIO/LazyAIO.exe
windows11-21h2-x64
7Randome/Minecraft.rar
windows11-21h2-x64
3Minecraft/...ft.exe
windows11-21h2-x64
4VenomRAT v...nt.exe
windows11-21h2-x64
10Analysis
-
max time kernel
386s -
max time network
407s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-09-2024 20:25
Behavioral task
behavioral1
Sample
GMAIL/Gmail.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
GMAIL/Leaf.xNet.js
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Instagram VM.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Randome/LaxyAIO_p_.rar
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
LazyAIO/LazyAIO.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Randome/Minecraft.rar
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Minecraft/Minecraft.exe
Resource
win11-20240802-en
General
-
Target
VenomRAT v6.0.3_p_/Client.exe
-
Size
73KB
-
MD5
5d6802a39c1bea84e1bd3e6ba23b7bbb
-
SHA1
17b6040dcd0dc6c0cf794b6d95ed4da0f07ef0b9
-
SHA256
d1fd56cb9943f5b185c8ee52a34f7ea4d34c5091f77ea18138f1d13a8951dd5e
-
SHA512
55df1ab721022d363b6d454ab496b7cc542702edda0525037cc8f0c33a1d93bc50ed62be8d4b95ba1248d7fee5b806d599ddce5e3ff6a9d4464e3047a0ee799d
-
SSDEEP
1536:LUUPcxVteCW7PMVee9VdQkhDIyH1bf/mc6QzcajVclNw:LUmcxV4x7PMVee9VdQgH1bfd6QLJY+
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
93.82.44.26:4040
nheplizwdi
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
Client.exepid process 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe 6020 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client.exedescription pid process Token: SeDebugPrivilege 6020 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid process 6020 Client.exe