Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 21:53
Behavioral task
behavioral1
Sample
sdfgsdf.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
sdfgsdf.exe
-
Size
74KB
-
MD5
da05df2464aac7f78bda7db6286fbc9e
-
SHA1
a3030350716b16ed71b5754efdeffacbcfaeaee7
-
SHA256
1f981bb1fd6930e5fbfdea2596c7a7c3d8bd754b6fabcf6dd493ae3a965be2f7
-
SHA512
8120b9a2179c81a2384430109a065259643d3466fc191b88e9799fffe5dc3640e7e213c8a17ce1f3d3572e7bf6b3503890a80483999fd9fb35067ab6524ab13c
-
SSDEEP
1536:jUD0cxVGlCBiPMV+GgIyYIrH1bS/iUOwq4QzcmLVclN:jUAcxVMWiPMV1gIyZH1bSfO+Q/BY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
127.0.0.1:9999
127.0.0.1:7473
147.185.221.17:4449
147.185.221.17:9999
147.185.221.17:7473
Mutex
avteivezmdvkonymgmf
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/2232-1-0x0000000000890000-0x00000000008A8000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2232 sdfgsdf.exe 2232 sdfgsdf.exe 2232 sdfgsdf.exe 2232 sdfgsdf.exe 2232 sdfgsdf.exe 2232 sdfgsdf.exe 2232 sdfgsdf.exe 2232 sdfgsdf.exe 2232 sdfgsdf.exe 2232 sdfgsdf.exe 2232 sdfgsdf.exe 2232 sdfgsdf.exe 2232 sdfgsdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2232 sdfgsdf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2232 sdfgsdf.exe