Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 10:54
Behavioral task
behavioral1
Sample
Client2.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Client2.exe
-
Size
74KB
-
MD5
53af966ce45fe989fec58b3be73b0f2e
-
SHA1
f38bf7499b42408c415c2b5a4ab741534ccd6089
-
SHA256
4e59b645c37760701df97342baa843b79e654fe23c7818449cff5833f39d8bb6
-
SHA512
047be4590e8a77567d9db9556f87fb46c793ab783f24c753c7a69b1d62dc7bb00dc68d879d0f67dcc62ba686679d75de7cc7d52e1ef93145e5fe06711f59b7fb
-
SSDEEP
1536:/UEkcx4VHsC0SPMVk1yievkIXH1b1/e0B8lKQzceLVclN:/Uxcx4GfSPMVOyzZH1b1WWQ3BY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
hfsstaoahdfpfcem
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/4864-1-0x00000000006A0000-0x00000000006B8000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe 4864 Client2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4864 Client2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4864 Client2.exe