Behavioral task
behavioral1
Sample
7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe
Resource
win7-20240903-en
General
-
Target
7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289
-
Size
74KB
-
MD5
db502a66ed6eba1496277893356009a3
-
SHA1
7a298afae8c4523dc51245d0d9a5aa8d2a1bfe3e
-
SHA256
7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289
-
SHA512
e6a1c0d25da04d9ee68df5aeab7eaa8d695d8f73031d23b1aaf275dc57cb84784f0d2cc13e670c67676df7c53afdfdc3f653315a5c119584b4790267391346c3
-
SSDEEP
1536:1ULkcxVKpC6yPMVKe9VdQuDI6H1bf/ISCQzcGLVclN:1UocxVENyPMVKe9VdQsH1bfwSCQfBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
frirxjguotjierkd
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/E41BUzEu
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule sample family_asyncrat -
Asyncrat family
-
Processes:
resource yara_rule sample VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289
Files
-
7873d35d4c9ed8188f0a96466c30c704a0c6b327cc8be398d9ed1cd1df26a289.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ