Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 15:04
Behavioral task
behavioral1
Sample
globalratclient.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
globalratclient.exe
-
Size
94KB
-
MD5
50b0eb7ebcdadac737f3b4c3a3272b26
-
SHA1
a5431a2c6639e26950210e529401d76b259fabd3
-
SHA256
3204cf1f3baed314a8c5b4ea33fb59c3a7701077f6f798d6c45659182f3b3692
-
SHA512
d0a578f124aa5381e1804134933350267892469a2b6ddcfa3fa25f8d2a8509da3c88908f0548131cecbe4bc05b0bcb90c48f48990e877bfe3b25057fa56b886d
-
SSDEEP
1536:XUEkcx4VHsC0SPMVrModOO+VvQDPjjIaH1b6/S4jQzchKqkSZZZ3gNxibHnVclN:XUxcx4GfSPMVrfdkSH1b664jQsUURbHe
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
89.182.200.156:4449
Mutex
fxcpkepgayovnbqlodh
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/1004-1-0x0000000000EF0000-0x0000000000F0C000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1004 globalratclient.exe 1004 globalratclient.exe 1004 globalratclient.exe 1004 globalratclient.exe 1004 globalratclient.exe 1004 globalratclient.exe 1004 globalratclient.exe 1004 globalratclient.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1004 globalratclient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1004 globalratclient.exe