Analysis
-
max time kernel
147s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 17:17
Behavioral task
behavioral1
Sample
bbc.exe
Resource
win7-20240729-en
windows7-x64
7 signatures
150 seconds
General
-
Target
bbc.exe
-
Size
74KB
-
MD5
f27f6fd07097d8bcbb0d21fbdbb8ef9a
-
SHA1
7d8fa1fc5ae209e48f2d2de18ab35ad56ccb74b6
-
SHA256
92b99499e4ed8034786c27e1f133e838421a4d9e2635edf3dbf5e8b83489840a
-
SHA512
9822cf831beabb50b72cf4b1e5f7a2c6370e489659651f6cfa4a293e62c7dba52f6119b4931c7cae84adc9102c86f8a5cf2a7cf1b9d37ec12372c1cfb7699a90
-
SSDEEP
1536:8UUPcxVteCW7PMVts44xCYYYHYYYYYYYYYFKYFYY6MYY99bzYYtUITQ1bj/cK4Qh:8UmcxV4x7PMVtr44Q1bjuQYBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:31324
Mutex
okfypypwywkzjwb
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/1656-1-0x00000000000C0000-0x00000000000D8000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe 1656 bbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1656 bbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1656 bbc.exe