General
-
Target
JaffaCakes118_dd94071cab75b6c0edd947b57439ec3a70e0c45fa9add74396d9a8058cfcd879
-
Size
426KB
-
Sample
241230-w1y7zsspbq
-
MD5
168378e8a46b7d46dff6f1ef480e35c1
-
SHA1
03f9d268aa5fc76e623175f43570a85cb246bf07
-
SHA256
dd94071cab75b6c0edd947b57439ec3a70e0c45fa9add74396d9a8058cfcd879
-
SHA512
4dec9d14fa148031ff2fce5111d2f7c4153787ebc3c46b27934892ea92b9d5377d196abcbbe5fdd3336dd26f6d601e162468d780f6d3fd4d26cb169b0dd038c3
-
SSDEEP
6144:4+7NTvA0b6XG1MRTlwQaZmrH6YqsYJuAg5/41iOO7gvqipDi/+:4ovt621MHamrH6YGuAa/41itsvqKY+
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dd94071cab75b6c0edd947b57439ec3a70e0c45fa9add74396d9a8058cfcd879.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dd94071cab75b6c0edd947b57439ec3a70e0c45fa9add74396d9a8058cfcd879.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
venom12345.duckdns.org:4449
venomunverified.duckdns.org:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
JaffaCakes118_dd94071cab75b6c0edd947b57439ec3a70e0c45fa9add74396d9a8058cfcd879
-
Size
426KB
-
MD5
168378e8a46b7d46dff6f1ef480e35c1
-
SHA1
03f9d268aa5fc76e623175f43570a85cb246bf07
-
SHA256
dd94071cab75b6c0edd947b57439ec3a70e0c45fa9add74396d9a8058cfcd879
-
SHA512
4dec9d14fa148031ff2fce5111d2f7c4153787ebc3c46b27934892ea92b9d5377d196abcbbe5fdd3336dd26f6d601e162468d780f6d3fd4d26cb169b0dd038c3
-
SSDEEP
6144:4+7NTvA0b6XG1MRTlwQaZmrH6YqsYJuAg5/41iOO7gvqipDi/+:4ovt621MHamrH6YGuAa/41itsvqKY+
Score10/10-
Asyncrat family
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-