Analysis
-
max time kernel
507s -
max time network
440s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 17:13
Behavioral task
behavioral1
Sample
Clieefsefsefsefnt.exe
Resource
win7-20241010-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Clieefsefsefsefnt.exe
-
Size
74KB
-
MD5
31583b96cee10049b270b40099683cb6
-
SHA1
b22eccfc39147f3f4664d51a287ea12b6d82e259
-
SHA256
238584430a2d2212e99c6f55390466e310d037e724e6c2fea3ddfaa6f1636245
-
SHA512
d5902b4aa77620b4311f56e6fb8bfa41133ab3f49ea7a02ca00049893ccb7f81a0255b6d92c46591587f74c3274e3903928e4ea5fd10770c812adc6e933882d0
-
SSDEEP
1536:IUUPcxVteCW7PMVMxxnmAu0mYIaH1b+/IX68jQzcKLVclN:IUmcxV4x7PMVMxVkiH1b+gK8jQ7BY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:30847
Mutex
ndnbxjcvvqqio
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe 4864 Clieefsefsefsefnt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4864 Clieefsefsefsefnt.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4864 Clieefsefsefsefnt.exe