Overview
overview
10Static
static
10VenomRAT v...nt.exe
windows7-x64
10VenomRAT v...nt.exe
windows10-2004-x64
10VenomRAT v...er.exe
windows7-x64
1VenomRAT v...er.exe
windows10-2004-x64
1VenomRAT v...er.exe
windows7-x64
1VenomRAT v...er.exe
windows10-2004-x64
1VenomRAT v...er.exe
windows7-x64
1VenomRAT v...er.exe
windows10-2004-x64
1VenomRAT v...nc.exe
windows7-x64
1VenomRAT v...nc.exe
windows10-2004-x64
1VenomRAT v...ny.exe
windows7-x64
10VenomRAT v...ny.exe
windows10-2004-x64
10VenomRAT v...64.exe
windows7-x64
10VenomRAT v...64.exe
windows10-2004-x64
10VenomRAT v...er.exe
windows7-x64
10VenomRAT v...er.exe
windows10-2004-x64
10Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 16:14
Behavioral task
behavioral1
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Client.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Client.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/DevExpress.WinRTPresenter.Launcher.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/DevExpress.WinRTPresenter.Launcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Keylogger.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Keylogger.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Plugins/Keylogger.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Plugins/Keylogger.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Plugins/hvnc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Plugins/hvnc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Stub/ClientAny.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Stub/ClientAny.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Stub/Clientx64.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Stub/Clientx64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Venom RAT + HVNC + Stealer + Grabber.exe
Resource
win7-20241010-en
General
-
Target
VenomRAT v6.0.3 (+SOURCE)/VenomRAT v6.0.3 (SOURCE)/Stub/Clientx64.exe
-
Size
71KB
-
MD5
33aa30124ec0b36f1a9319cd62a11e84
-
SHA1
f8181335be708048b28cf1540054a5dd9d6acf8c
-
SHA256
c6a8838b3619db76fc89af6bbd9188f868557348b3d06e2815eae2882dae8ec3
-
SHA512
fceed2946791b47eb3e9f5b94fb11104abdc6bd8c2ae3c4c4694880af168608822a0b77ceecaeda125a04ffe2fcc081bf0e003c17ba3dc34a6ad261d45da7e65
-
SSDEEP
768:aEFJ2BAxBMXR5OavIpl2d90CfOmfiEq586H+XVhMxEILH5DMnuqLch04U0VTLgSS:LJmm+A58TXsLpUuqudLuGjhMCVclN
Malware Config
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1716 Clientx64.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1272 1716 Clientx64.exe 30 PID 1716 wrote to memory of 1272 1716 Clientx64.exe 30 PID 1716 wrote to memory of 1272 1716 Clientx64.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\Stub\Clientx64.exe"C:\Users\Admin\AppData\Local\Temp\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\Stub\Clientx64.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1716 -s 6002⤵PID:1272
-