Analysis
-
max time kernel
9s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
VenomRATHVNCStealerGrabber.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
VenomRATHVNCStealerGrabber.exe
Resource
win10v2004-20241007-en
General
-
Target
VenomRATHVNCStealerGrabber.exe
-
Size
7.3MB
-
MD5
ad0ad41bed640b3331c1bc13099b32ff
-
SHA1
5ebce59397c282b77ee8a2498095033ac68ddc04
-
SHA256
2761f7bd15a3e4ce953dd3ceed0863751a0890fe99b58e0452fc0bd9b9fd24b0
-
SHA512
9212304be53b5dc7d200fe7f84504f2f5e00550b5751369bb86fda034ea62fe917d23a8f61d2e2fce66a707e44b2d023dedcae46c92bb89417f5046e66005dc7
-
SSDEEP
196608:1U4fa36sXKUOJIZZbNFcbHeazVK2TVYVLi3yYl8sY64hfT:jCqsX4aJq7RTVv3Vz4x
Malware Config
Signatures
-
.NET Reactor proctector 41 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/516-2-0x0000000007490000-0x0000000008410000-memory.dmp net_reactor behavioral1/memory/516-5-0x0000000008410000-0x0000000009390000-memory.dmp net_reactor behavioral1/memory/516-7-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-12-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-88-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-90-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-87-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-22-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-84-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-77-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-72-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-40-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-24-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-80-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-21-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-74-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-67-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-19-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-62-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-59-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-55-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-48-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-47-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-16-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-42-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-39-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-14-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-36-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-31-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-27-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-92-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-83-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-78-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-70-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-65-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-52-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-45-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-35-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-28-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-11-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor behavioral1/memory/516-32-0x0000000008410000-0x0000000009389000-memory.dmp net_reactor -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VenomRATHVNCStealerGrabber.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 516 VenomRATHVNCStealerGrabber.exe