Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 12:39
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Client.exe
-
Size
74KB
-
MD5
bed60238455e80c2a2cc93e4ac176b34
-
SHA1
b6ef5cd9b02d735beb3d71f8d6ec54db8fee1255
-
SHA256
4e1cc988abe3ccd1efa3e9911985b1e4c5ca2741a3b54f932f25fb3393d48859
-
SHA512
ed4531ec9429abbec0ce790157f67311c6d5f8c9823f912732db28a9b6e732a60aa90ad16db935da11dca65d319c7aea991de3c13a82b3afb7d0091ca69e5bf8
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/3xQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bf5QYBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
akjovkkmkkr
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/1800-1-0x0000000000C60000-0x0000000000C78000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe 1800 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1800 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1800 Client.exe