Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 20:56
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Client.exe
-
Size
74KB
-
MD5
f9519b6edbaf7635041a254c85af2597
-
SHA1
0888c02a548c52d798b463d83851dd4cc34507b3
-
SHA256
1ea5471443a6074ebacb85e46b76dc06601e233baa29b44eff6b127e007b12c7
-
SHA512
bdfc704c634c44dfcb6d485eeeff8146435dcf500dce5188536410859aed2d7e2c426aa79784523fbc486151706178c9bddd0a552ddce810271cdf6b5892e468
-
SSDEEP
1536:2UXNwcxKHXwzCtmPMV2e9VdQuDI6H1bf/QRIYQzcqLVclN:2UXicxK8WmPMV2e9VdQsH1bfOLQbBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
Mutex
huakilfgwvmjg
Attributes
-
c2_url_file
https://paste.ee/r/vqBOJ/0
-
delay
1
-
install
false
-
install_file
system.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1668-1-0x00000000003A0000-0x00000000003B8000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
Client.exepid process 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe 1668 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client.exedescription pid process Token: SeDebugPrivilege 1668 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid process 1668 Client.exe