Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win7-20240729-en
General
-
Target
spoofer.exe
-
Size
74KB
-
MD5
066bcecb871cf212cd6f05ba1cc5935b
-
SHA1
5ae3c70686f97d1d5e2ad9606a5ad28c66fc6482
-
SHA256
db68fed304d8f679185f1c6dbd7147fa1cee2c0e15f5d61af3544b53ca835d8c
-
SHA512
346cba84e423900ea76a6e804ceed0c23ee71d78ef3e78e8823c35fc72d4bbc4d77924992d4fa78bf9fb1c8a97d5eff83d3a8b5cb751498099e49a769e1a924c
-
SSDEEP
1536:6Uqkcxw+/9CZSPMVL1hEi1IbH1bi/tVlhSQzcU4VclN:6UDcxw+1uSPMVL1hEikH1bilnYQlCY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:5033
147.185.221.17:5033
spoofereac
-
delay
1
-
install
true
-
install_file
eac spoofer.exe
-
install_folder
%AppData%
Signatures
Files
-
spoofer.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ