Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 12:39
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Client.exe
-
Size
74KB
-
MD5
bed60238455e80c2a2cc93e4ac176b34
-
SHA1
b6ef5cd9b02d735beb3d71f8d6ec54db8fee1255
-
SHA256
4e1cc988abe3ccd1efa3e9911985b1e4c5ca2741a3b54f932f25fb3393d48859
-
SHA512
ed4531ec9429abbec0ce790157f67311c6d5f8c9823f912732db28a9b6e732a60aa90ad16db935da11dca65d319c7aea991de3c13a82b3afb7d0091ca69e5bf8
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/3xQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bf5QYBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
akjovkkmkkr
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/2508-1-0x0000000000D00000-0x0000000000D18000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe 2508 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2508 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2508 Client.exe