Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 10:46
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240729-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Client.exe
-
Size
74KB
-
MD5
91676fbbabfdbe23dde10f191b7de0b7
-
SHA1
bab7c944ac27a60369291840f514ddfe09e0eb24
-
SHA256
67a2ec5ea6634de954c29775e64a0c7c5e7c1116a2c1b46b5e8623aa379fd4f0
-
SHA512
87782b8abaec59881acb089d2e05d5615a24d079030b060921202ef5cc1b43f448dff795f46f1716556a20cd55dbc27d43659417e340cf99e19c2843e383d404
-
SSDEEP
1536:EUEkcx4VHsC0SPMV7e9VdQuDI6H1bf/+E6+Qzc2LVclN:EUxcx4GfSPMV7e9VdQsH1bfM+QPBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
gyqhwhhtnrxxkzbf
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe 3656 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3656 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3656 Client.exe