Overview
overview
10Static
static
10VenomRAT v...re.dll
windows11-21h2-x64
1VenomRAT v...re.dll
windows11-21h2-x64
1VenomRAT v...rt.dll
windows11-21h2-x64
1VenomRAT v...re.dll
windows11-21h2-x64
1VenomRAT v...re.dll
windows11-21h2-x64
1VenomRAT v....1.dll
windows11-21h2-x64
1VenomRAT v...UI.dll
windows11-21h2-x64
1VenomRAT v....2.dll
windows11-21h2-x64
1VenomRAT v...er.exe
windows11-21h2-x64
1VenomRAT v...or.vbs
windows11-21h2-x64
1VenomRAT v...er.vbs
windows11-21h2-x64
1VenomRAT v...ods.js
windows11-21h2-x64
3VenomRAT v...per.js
windows11-21h2-x64
3VenomRAT v...ker.js
windows11-21h2-x64
3VenomRAT v...em.vbs
windows11-21h2-x64
1VenomRAT v...ify.js
windows11-21h2-x64
3VenomRAT v...Box.js
windows11-21h2-x64
3VenomRAT v...ms.vbs
windows11-21h2-x64
1VenomRAT v...gs.vbs
windows11-21h2-x64
1VenomRAT v...ec.vbs
windows11-21h2-x64
1VenomRAT v...ny.exe
windows11-21h2-x64
10VenomRAT v...64.exe
windows11-21h2-x64
10VenomRAT v...86.exe
windows11-21h2-x64
10VenomRAT v...on.dll
windows11-21h2-x64
1VenomRAT v...ls.dll
windows11-21h2-x64
3VenomRAT v....3.exe
windows11-21h2-x64
10VenomRAT v...ib.dll
windows11-21h2-x64
1VenomRAT v...Ip.dll
windows11-21h2-x64
1VenomRAT v...ib.dll
windows11-21h2-x64
1VenomRAT v...rd.dll
windows11-21h2-x64
1VenomRAT v...re.dll
windows11-21h2-x64
1VenomRAT v...et.dll
windows11-21h2-x64
1Analysis
-
max time kernel
85s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/12/2024, 03:21
Behavioral task
behavioral1
Sample
VenomRAT v6.0.3/DevExpress.RichEdit.v22.1.Core.dll
Resource
win11-20241023-en
Behavioral task
behavioral2
Sample
VenomRAT v6.0.3/DevExpress.RichEdit.v22.2.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
VenomRAT v6.0.3/DevExpress.RichEdit.v22.2.Export.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
VenomRAT v6.0.3/DevExpress.Sparkline.v22.1.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
VenomRAT v6.0.3/DevExpress.Sparkline.v22.2.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
VenomRAT v6.0.3/DevExpress.Utils.v22.1.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
VenomRAT v6.0.3/DevExpress.Utils.v22.2.UI.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
VenomRAT v6.0.3/DevExpress.Utils.v22.2.dll
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
VenomRAT v6.0.3/DevExpress.WinRTPresenter.Launcher.exe
Resource
win11-20241023-en
Behavioral task
behavioral10
Sample
VenomRAT v6.0.3/Source Code/Helper/HexEditor/HexEditor.vbs
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
VenomRAT v6.0.3/Source Code/Helper/ListViewColumnSorter.vbs
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
VenomRAT v6.0.3/Source Code/Helper/Methods.js
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
VenomRAT v6.0.3/Source Code/Helper/RegistryKeyHelper.js
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
VenomRAT v6.0.3/Source Code/Helper/RegistrySeeker.js
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
VenomRAT v6.0.3/Source Code/Helper/RegistryValueLstItem.vbs
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
VenomRAT v6.0.3/Source Code/Helper/TelegramNotify.js
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
VenomRAT v6.0.3/Source Code/Helper/WordTextBox.js
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
VenomRAT v6.0.3/Source Code/Params/KeylogParams.vbs
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
VenomRAT v6.0.3/Source Code/Properties/Settings.vbs
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
VenomRAT v6.0.3/Source Code/StreamLibrary/IUnsafeCodec.vbs
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
VenomRAT v6.0.3/Stub/ClientAny.exe
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
VenomRAT v6.0.3/Stub/Clientx64.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
VenomRAT v6.0.3/Stub/Clientx86.exe
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
VenomRAT v6.0.3/System.IO.Compression.dll
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
VenomRAT v6.0.3/System.ServiceModel.Internals.dll
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
VenomRAT v6.0.3/VenomRAT v6.0.3.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
VenomRAT v6.0.3/Vestris.ResourceLib.dll
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
VenomRAT v6.0.3/cGeoIp.dll
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
VenomRAT v6.0.3/dnlib.dll
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
VenomRAT v6.0.3/netstandard.dll
Resource
win11-20241023-en
Behavioral task
behavioral31
Sample
VenomRAT v6.0.3/protobuf-net.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
VenomRAT v6.0.3/protobuf-net.dll
Resource
win11-20241007-en
General
-
Target
VenomRAT v6.0.3/Stub/Clientx86.exe
-
Size
71KB
-
MD5
9e58447fdcf9d7625879dc2f8e51d41e
-
SHA1
2b64506b4f318a4154f51dec8db498b0ca2f075b
-
SHA256
fb646f0abb2d769531bdcbbb33c15b8d65a2f948a9b027005a007f1ae7fb6d23
-
SHA512
bcf6ec720c1d8e7e3608453f05626db9569b32448c53520b52c143c1da6e5c015105d57dccaf6b47bfd37fa757a91cfa647c7e5832a7d52b8eb0bb6955615fbf
-
SSDEEP
768:j2FJ2BAxBMXR5OavIpl2d90CfOm3iEq586H+XVhMxEILH5DMnuqkch04U0VTLgSy:gJmm+I58TXsLpUuqrdLuGjhsuVclN
Malware Config
Signatures
-
Asyncrat family
-
Program crash 1 IoCs
pid pid_target Process procid_target 4976 4116 WerFault.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clientx86.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4116 Clientx86.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\VenomRAT v6.0.3\Stub\Clientx86.exe"C:\Users\Admin\AppData\Local\Temp\VenomRAT v6.0.3\Stub\Clientx86.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 10442⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4116 -ip 41161⤵PID:4884