General
-
Target
JaffaCakes118_2d25fa02fb76d661dd326bfac20a888f2207a5a4310faafb8a1c1e4d23d89580
-
Size
1.7MB
-
Sample
241230-yn56wayndt
-
MD5
ba39e9cb587c3f666793fa23e5b94b93
-
SHA1
8a1c3bee1b8ef4cf668d9ebc0f9490b900a7c9cd
-
SHA256
2d25fa02fb76d661dd326bfac20a888f2207a5a4310faafb8a1c1e4d23d89580
-
SHA512
41c7211a90e734e5e88592347f4c78a5f9a0674a9461b45d87b2d664b9e2890790edc5cb820b9986a0200088b912e02bc852d497f075df11efe8032b5091d576
-
SSDEEP
3072:GNXhPFgvncy6cgVRkj5sCQrSYY8tgZaBOUEs64BRg40nuFbl3TQ9:GNVyCRkjjQrS8tgZaBUeBRgul29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2d25fa02fb76d661dd326bfac20a888f2207a5a4310faafb8a1c1e4d23d89580.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2d25fa02fb76d661dd326bfac20a888f2207a5a4310faafb8a1c1e4d23d89580.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
Venom Clients
theyk6836.duckdns.org:9026
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
JaffaCakes118_2d25fa02fb76d661dd326bfac20a888f2207a5a4310faafb8a1c1e4d23d89580
-
Size
1.7MB
-
MD5
ba39e9cb587c3f666793fa23e5b94b93
-
SHA1
8a1c3bee1b8ef4cf668d9ebc0f9490b900a7c9cd
-
SHA256
2d25fa02fb76d661dd326bfac20a888f2207a5a4310faafb8a1c1e4d23d89580
-
SHA512
41c7211a90e734e5e88592347f4c78a5f9a0674a9461b45d87b2d664b9e2890790edc5cb820b9986a0200088b912e02bc852d497f075df11efe8032b5091d576
-
SSDEEP
3072:GNXhPFgvncy6cgVRkj5sCQrSYY8tgZaBOUEs64BRg40nuFbl3TQ9:GNVyCRkjjQrS8tgZaBUeBRgul29
Score10/10-
Asyncrat family
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-