General
-
Target
JaffaCakes118_e2f693427eb98ff14d97a66007433ddebb3a8311309e2b1f1a95a07c3ec397b4
-
Size
300.0MB
-
Sample
241221-y4tssaypdr
-
MD5
f2fe09806411a018f01bb6a12a80b2b2
-
SHA1
c08c933ff0bd50a1bded400f086378ddaab5ba4d
-
SHA256
e2f693427eb98ff14d97a66007433ddebb3a8311309e2b1f1a95a07c3ec397b4
-
SHA512
e435ef3941858b3e3a4d24bfd9778b9c683185472cdd326209dfdbfdc6cfdcea91fa01583985e586db01ef07749c5d1629091117661e7f60db0a9d0e4bd451b8
-
SSDEEP
3072:bXlvFgvATyfHSt0Vki6jKV1c2jZZIUh7yZGRXBOUEs64BRg40nuFbl3TQ9:b4vj562V/UZ+BUeBRgul29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2f693427eb98ff14d97a66007433ddebb3a8311309e2b1f1a95a07c3ec397b4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2f693427eb98ff14d97a66007433ddebb3a8311309e2b1f1a95a07c3ec397b4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
Venom Clients
theyk6836.duckdns.org:9026
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
JaffaCakes118_e2f693427eb98ff14d97a66007433ddebb3a8311309e2b1f1a95a07c3ec397b4
-
Size
300.0MB
-
MD5
f2fe09806411a018f01bb6a12a80b2b2
-
SHA1
c08c933ff0bd50a1bded400f086378ddaab5ba4d
-
SHA256
e2f693427eb98ff14d97a66007433ddebb3a8311309e2b1f1a95a07c3ec397b4
-
SHA512
e435ef3941858b3e3a4d24bfd9778b9c683185472cdd326209dfdbfdc6cfdcea91fa01583985e586db01ef07749c5d1629091117661e7f60db0a9d0e4bd451b8
-
SSDEEP
3072:bXlvFgvATyfHSt0Vki6jKV1c2jZZIUh7yZGRXBOUEs64BRg40nuFbl3TQ9:b4vj562V/UZ+BUeBRgul29
Score10/10-
Asyncrat family
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-