Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 22:01
Behavioral task
behavioral1
Sample
dvdvxvdd.exe
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
dvdvxvdd.exe
-
Size
74KB
-
MD5
d006bff7afbc8f4b309a00f64b94552e
-
SHA1
85766563c8988d62564373e20656cfb793d80f9d
-
SHA256
f758b089bb08d377a6c315711ca7ba429508067e564c3efeed0c5f3ec8b30d6c
-
SHA512
7910631af6c5e6f70fe2d73fb5b5e4fdc960455c9dd4f83093448f6156a9478612525fd52f70375850d24a375cedc3a8473a34dd633e713489a5fe1468976f80
-
SSDEEP
1536:UUUPcxVteCW7PMV/OS0Ym4PXHIfJ1bo/+6CQzcWLVclN:UUmcxV4x7PMV/tXSJ1boGQvBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
193.161.193.99:1194
Mutex
oomevjnsonvqw
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe 316 dvdvxvdd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 316 dvdvxvdd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 316 dvdvxvdd.exe