Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 17:05
General
-
Target
ohioClient.exe
-
Size
74KB
-
MD5
3c88e44c4c659a642fa61477df547c90
-
SHA1
ab7202a1ec4bc99ac25b8dfeaf6d7c70a7210e67
-
SHA256
d0b2be37f730aa1e7c75dfa636fddbfa98b62ebac4f556ff3ca4974e586e909f
-
SHA512
cf351c8ee122310072e4c7a4cf109e55fb34460fef9412354b427f3b350809de86e502cf72978635456246459d00cfe91a5252b7c56549047eee9767dcb49782
-
SSDEEP
1536:4UUPcxVteCW7PMVQe8Be8WIlH1bi/kTA94QzcaLVclN:4UmcxV4x7PMVt8xVH1biQI4QLBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:30847
Mutex
ndnbxjcvvqqio
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe 3452 ohioClient.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3452 ohioClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3452 ohioClient.exe