General
-
Target
JaffaCakes118_bc649a11850db40e2c753878c6ba390f8ea08c0e7fae4a9d4c44d470762cce53
-
Size
107KB
-
Sample
241226-2sqhrstpgq
-
MD5
8a1045764a6a99ae682a0cb403b6e572
-
SHA1
c4ac3b6b8d63c066531118f8f666446f0def07f6
-
SHA256
bc649a11850db40e2c753878c6ba390f8ea08c0e7fae4a9d4c44d470762cce53
-
SHA512
37b656893ef9ebd6300b14386346c4c15f11c439776fbb4e55ae389673b486021eefdc7aeaff62527359187fd7417dd27f9687b8a5efec5c30d4c7c6b9df6689
-
SSDEEP
3072:arruvta31Om4EdBBQTvzTzZmwIuDV9o3pP:afOCyTtIuApP
Static task
static1
Behavioral task
behavioral1
Sample
EKTEY03H.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
EKTEY03H.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
Venom Clients
yedbopds.duckdns.org:9056
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
EKTEY03H.EXE
-
Size
300.0MB
-
MD5
93e5b5997ba7511c9648a679d24070d8
-
SHA1
97c0a7b98c7fe0728bec01fee5f5d3c4d1b34f00
-
SHA256
b2c0e249df623b4562efe97278af7671b24e5a1736291200617b19239d871034
-
SHA512
469513cbe362e1eea9f316859fa149063cd45c44de89e715a13e9d0ce1aebdd46a46b96476c6ff169cee587013ed5c20d10cfac99ab8fbffb85e750dcd1e3d16
-
SSDEEP
3072:+g8JUq6cg5wCacuLf67MJQn4TK/5DrNeusK:zmUBcgCCLuuyc4TKBDrNeux
Score10/10-
Asyncrat family
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-