Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 17:14
Behavioral task
behavioral1
Sample
123.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
150 seconds
General
-
Target
123.exe
-
Size
74KB
-
MD5
bed09e12d722ad65c0898ccf80ee496d
-
SHA1
e54a8026da77b569fc4c348dadd1314a327a867d
-
SHA256
1b148eca040fe69af6c9880ee3c199d8607ce082e72fa29b5e8d81becb61cefc
-
SHA512
735f9adfedddbf8ef278b37a705e89562b69fda3a980b28d3252bec8df6453f34efbf7d48c641faa55906accd76269ebd2ede4bec7eb728447b3aa65e6627450
-
SSDEEP
1536:8UUPcxVteCW7PMV14koVBYYYHYYYYYYYYYZqYFYY6MYY99bzYYtBSI+H1bQ/8sB+:8UmcxV4x7PMV1DoOH1bQhQYBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:31650
Mutex
jbaxvjyyjqvurx
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/1944-1-0x0000000001370000-0x0000000001388000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe 1944 123.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1944 123.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1944 123.exe