General
-
Target
gamesense.exe
-
Size
74KB
-
MD5
f80d39235071bfee3b4d869d5c40a0b5
-
SHA1
57872f4f77e4416db34047d887ac8413b94780e6
-
SHA256
6fb8cc16b1ccca659be32d77ec18818579183e20c900a2c33252f83abc038e1e
-
SHA512
96cf0a780e7cc3a9f9aa6c95d8ff70b0c430e94a7bd1cb80a563773cdd65a08b221a32b2f4bcdfe3e54d54216c42d9c98ea45d350a396cba93233224a5da257c
-
SSDEEP
1536:rUEkcx4VHsC0SPMVW6DeI/H1b4/cqjQzcCLVclN:rUxcx4GfSPMVWqnH1b4ljQTBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
ekeoabajpfxgmzzzia
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
gamesense.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ