General
-
Target
JaffaCakes118_8bd8e4dff728c174981743c2591dc33925092bd728b0d853c808bfd1f18278c9
-
Size
522KB
-
Sample
241229-lk437aykhy
-
MD5
2c51e282052f1b621dccae924acac323
-
SHA1
0c85e5ea92b5d0f14e082441f4d5e67c7aaf1abf
-
SHA256
8bd8e4dff728c174981743c2591dc33925092bd728b0d853c808bfd1f18278c9
-
SHA512
901e38d561016ca9ddb89af7bd4da729e42b87b56b7024580fbfa6f34a26b3ad82290ef7f9a4b59eb4815819bf81e4f88e949ad915a7b9e12eef91efdc9e016a
-
SSDEEP
6144:jYqI0zbVtOw7BcedtNv4ruicWwt/VrldEoF:jYqx1QQBcedtNsHwt/VrlKoF
Static task
static1
Behavioral task
behavioral1
Sample
eVoucher.exe
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
August-04
fejong.duckdns.org:25045
iordes45s
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
eVoucher.exe
-
Size
300.0MB
-
MD5
3bf947955196c0d542ab337354bba05f
-
SHA1
9695affc705e866e7b1307ecfadd9db37acc3918
-
SHA256
49cb3e0011f6d43b205c5336abf642d56ad93c7ebb250aa8cc907d08d06f382e
-
SHA512
1dd243cc586dc516044b9e42452bba87a796a6c177bfef7cd4a1be12bd7282f3887bf220b2411f360c5ba82bd59276ccc3265b4aecc2173cd3f6a7d88194fe6f
-
SSDEEP
6144:xpOo/IPZccVtOw7Msw0b+lNZxsEOFco5z:rOo/YZ1QQXz6lHP8
-
Asyncrat family
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-