Behavioral task
behavioral1
Sample
WindowsDF.exe
Resource
win7-20240903-en
General
-
Target
WindowsDF.exe
-
Size
74KB
-
MD5
3cedbc72cc821f346b56100c311f7caf
-
SHA1
09d762e1d9ec34854c50ab8c7063f7d44fd3165e
-
SHA256
1583c039098be20a5d2076827affa434a8fd385f8e629ecdcdf44750d08dfbe2
-
SHA512
04237742a94275fa68fb91b5a9d4dfd0f54174a6504bd726d63d53791dad2acc62356a74b8c0f2284fa93ad509468092c12fb1dc92c583d8197187b03b6301fa
-
SSDEEP
1536:/Uq0cxVGlCBiPMVsOieqIbW1bh/k0owuQzcKLVclN:/UTcxVMWiPMVTHW1bhvCQ7BY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
189.14.53.123:1177
189.14.53.123:21053
cijkkekfusbnuncqp
-
delay
1
-
install
true
-
install_file
WindowsDefender.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule sample family_asyncrat -
Asyncrat family
-
Processes:
resource yara_rule sample VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource WindowsDF.exe
Files
-
WindowsDF.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ