Overview
overview
10Static
static
10VenomRAT v...re.dll
windows11-21h2-x64
1VenomRAT v...re.dll
windows11-21h2-x64
1VenomRAT v...rt.dll
windows11-21h2-x64
1VenomRAT v...re.dll
windows11-21h2-x64
1VenomRAT v...re.dll
windows11-21h2-x64
1VenomRAT v....1.dll
windows11-21h2-x64
1VenomRAT v...UI.dll
windows11-21h2-x64
1VenomRAT v....2.dll
windows11-21h2-x64
1VenomRAT v...er.exe
windows11-21h2-x64
1VenomRAT v...or.vbs
windows11-21h2-x64
1VenomRAT v...er.vbs
windows11-21h2-x64
1VenomRAT v...ods.js
windows11-21h2-x64
3VenomRAT v...per.js
windows11-21h2-x64
3VenomRAT v...ker.js
windows11-21h2-x64
3VenomRAT v...em.vbs
windows11-21h2-x64
1VenomRAT v...ify.js
windows11-21h2-x64
3VenomRAT v...Box.js
windows11-21h2-x64
3VenomRAT v...ms.vbs
windows11-21h2-x64
1VenomRAT v...gs.vbs
windows11-21h2-x64
1VenomRAT v...ec.vbs
windows11-21h2-x64
1VenomRAT v...ny.exe
windows11-21h2-x64
10VenomRAT v...64.exe
windows11-21h2-x64
10VenomRAT v...86.exe
windows11-21h2-x64
10VenomRAT v...on.dll
windows11-21h2-x64
1VenomRAT v...ls.dll
windows11-21h2-x64
3VenomRAT v....3.exe
windows11-21h2-x64
10VenomRAT v...ib.dll
windows11-21h2-x64
1VenomRAT v...Ip.dll
windows11-21h2-x64
1VenomRAT v...ib.dll
windows11-21h2-x64
1VenomRAT v...rd.dll
windows11-21h2-x64
1VenomRAT v...re.dll
windows11-21h2-x64
1VenomRAT v...et.dll
windows11-21h2-x64
1Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/12/2024, 03:21
Behavioral task
behavioral1
Sample
VenomRAT v6.0.3/DevExpress.RichEdit.v22.1.Core.dll
Resource
win11-20241023-en
Behavioral task
behavioral2
Sample
VenomRAT v6.0.3/DevExpress.RichEdit.v22.2.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
VenomRAT v6.0.3/DevExpress.RichEdit.v22.2.Export.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
VenomRAT v6.0.3/DevExpress.Sparkline.v22.1.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
VenomRAT v6.0.3/DevExpress.Sparkline.v22.2.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
VenomRAT v6.0.3/DevExpress.Utils.v22.1.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
VenomRAT v6.0.3/DevExpress.Utils.v22.2.UI.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
VenomRAT v6.0.3/DevExpress.Utils.v22.2.dll
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
VenomRAT v6.0.3/DevExpress.WinRTPresenter.Launcher.exe
Resource
win11-20241023-en
Behavioral task
behavioral10
Sample
VenomRAT v6.0.3/Source Code/Helper/HexEditor/HexEditor.vbs
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
VenomRAT v6.0.3/Source Code/Helper/ListViewColumnSorter.vbs
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
VenomRAT v6.0.3/Source Code/Helper/Methods.js
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
VenomRAT v6.0.3/Source Code/Helper/RegistryKeyHelper.js
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
VenomRAT v6.0.3/Source Code/Helper/RegistrySeeker.js
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
VenomRAT v6.0.3/Source Code/Helper/RegistryValueLstItem.vbs
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
VenomRAT v6.0.3/Source Code/Helper/TelegramNotify.js
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
VenomRAT v6.0.3/Source Code/Helper/WordTextBox.js
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
VenomRAT v6.0.3/Source Code/Params/KeylogParams.vbs
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
VenomRAT v6.0.3/Source Code/Properties/Settings.vbs
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
VenomRAT v6.0.3/Source Code/StreamLibrary/IUnsafeCodec.vbs
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
VenomRAT v6.0.3/Stub/ClientAny.exe
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
VenomRAT v6.0.3/Stub/Clientx64.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
VenomRAT v6.0.3/Stub/Clientx86.exe
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
VenomRAT v6.0.3/System.IO.Compression.dll
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
VenomRAT v6.0.3/System.ServiceModel.Internals.dll
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
VenomRAT v6.0.3/VenomRAT v6.0.3.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
VenomRAT v6.0.3/Vestris.ResourceLib.dll
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
VenomRAT v6.0.3/cGeoIp.dll
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
VenomRAT v6.0.3/dnlib.dll
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
VenomRAT v6.0.3/netstandard.dll
Resource
win11-20241023-en
Behavioral task
behavioral31
Sample
VenomRAT v6.0.3/protobuf-net.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
VenomRAT v6.0.3/protobuf-net.dll
Resource
win11-20241007-en
General
-
Target
VenomRAT v6.0.3/System.ServiceModel.Internals.dll
-
Size
804KB
-
MD5
7f35e0251f45807e872ee0a354a8fe81
-
SHA1
74cebb21cb95165774ea0ab082cb85cd3458ca8d
-
SHA256
805d9e2c5cd2f2b17e68763ae4eb1db0103bd278e526de32f98e0cd336541e14
-
SHA512
c5dfd9e43295b786eae9869ac1ede564d9d86255a58b3cf2f9af313c355fab8d5c3c4bd41291da65729ae510000446290588e9d67b2e65aa6da10777c6f5d38b
-
SSDEEP
12288:Nk6q80n+FoAY2aScs0pbpcCqunbh9Xj9OtCXK0VWLmYss:snhATaScs0pmCq8YtCXp8mYs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2696 wrote to memory of 3092 2696 rundll32.exe 77 PID 2696 wrote to memory of 3092 2696 rundll32.exe 77 PID 2696 wrote to memory of 3092 2696 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\VenomRAT v6.0.3\System.ServiceModel.Internals.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\VenomRAT v6.0.3\System.ServiceModel.Internals.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:3092
-