Behavioral task
behavioral1
Sample
meow.exe
Resource
win7-20240708-en
General
-
Target
meow.exe
-
Size
74KB
-
MD5
13f76a1c59b707e71c364ed33daa6bdc
-
SHA1
369d7916ccc6d1fd2a01364f2de7abab8b97195b
-
SHA256
eb6c7c3e258be4fe6a1e11f805650ab3fe971adfd989135d4540361d4e73a4a6
-
SHA512
e2a2bd27b288fb02167b093e2157c22de76496bfc00f98f2ef7871aa25583425d4485e7d9cfb1667d4f9b664cde4443abde205e3cbe2b5c15f959f1a93de79af
-
SSDEEP
1536:pUagcxybQCHWPMVy4vfT+dITH1bW/gRPzmQzcmLVclN:pUzcxyEkWPMVy4v3H1bWybmQ/BY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
88.173.32.153:8081
192.168.0.123:8081
nvcchosjxtsbhjmnnu
-
delay
1
-
install
false
-
install_file
test
-
install_folder
%AppData%
Signatures
Files
-
meow.exe.exe windows:4 windows x86 arch:x86
Password: meow
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ