Behavioral task
behavioral1
Sample
hh.exe
Resource
win7-20240729-en
General
-
Target
hh.exe
-
Size
74KB
-
MD5
2c43c5cd1bba8a4fa23b867065253068
-
SHA1
c6649471b371fcde5f52c23b8ca74fdc9451bdce
-
SHA256
12a5bcb300a793abd9b400aa92a187d175500700de373e32989ba99cc7d198fd
-
SHA512
f7795d8fd05833d02280ede7e39ad4e39daa527b270d1563d67902b9c30f7fc8176ac215d7fe538f1d3dc71d3a2812dd00f94e05df8deaa862c0e82b58bf7f43
-
SSDEEP
1536:gUEkcx4VHsC0SPMVeY7AX0I9H1bORi4zzeFQzcSLVclN:gUxcx4GfSPMVX0XzH1bOZzaQDBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
exyujhmexylpfeeot
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
hh.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ