Behavioral task
behavioral1
Sample
8c9e60c37d9052d42f46e6eb364811d6c02f7478f9049be97979104f40a52049.exe
Resource
win7-20240729-en
General
-
Target
2024_exe_blacksnow_20596311672.zip
-
Size
50KB
-
MD5
90bf3bae96bde51ed8f551f1efb1a473
-
SHA1
c406fb022d94a22d5d7c6faf4b5f175a9e56dc70
-
SHA256
89acdbc8fdf507d3989f490932f2a8084c144f9c00628962c7f8241cad3f6c57
-
SHA512
d9f1debbfbae85474214a3fe9340214e0a9d9ab99ea0b678c342048169c34621c889b5422bf390b457f7c3058053cec7336f45fb4b2f5bf7ccce8e2992effb02
-
SSDEEP
1536:xq/0M7ouiepDoyeUPpyMZ/IWBiuCMCRRm++AqFiDX:soqpEyeQONMCKvBkb
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
2023
2023
-
delay
1
-
install
true
-
install_file
2023.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/X5LTTgNb
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/8c9e60c37d9052d42f46e6eb364811d6c02f7478f9049be97979104f40a52049 family_asyncrat -
Asyncrat family
-
resource yara_rule static1/unpack001/8c9e60c37d9052d42f46e6eb364811d6c02f7478f9049be97979104f40a52049 VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/8c9e60c37d9052d42f46e6eb364811d6c02f7478f9049be97979104f40a52049
Files
-
2024_exe_blacksnow_20596311672.zip.zip
Password: infected
-
8c9e60c37d9052d42f46e6eb364811d6c02f7478f9049be97979104f40a52049.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ