Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-01-2025 10:15
General
-
Target
Client.exe
-
Size
74KB
-
MD5
f69003365524d559a838a60bbbdeac6e
-
SHA1
17aeb5be74829aa6414a2e5d7d48e1fb26deec4a
-
SHA256
a2120b35aa0cf07ad1f38bfc204a0425e087e958b65cbaacfaad6215f7c41642
-
SHA512
cb43744e61f0db47144d25e909fccf73ef777dd97dc7b30c7dc061b1c997f5ecbdbc3e9c795cace84ccf078f128aca676f894a3e771c3c399235dc4789569f37
-
SSDEEP
1536:FUd0cxm+XpbCNiPMVye9VdQuDI6H1bf/OtnQzckxLVclN:FUGcxm+XZKiPMVye9VdQsH1bfGtnQhxi
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
127.0.0.1:14000
127.0.0.1:3604
127.0.0.1:4444
207.148.2.31:4449
207.148.2.31:14000
207.148.2.31:3604
207.148.2.31:4444
147.185.221.25:4449
147.185.221.25:14000
147.185.221.25:3604
147.185.221.25:4444
Mutex
sdcsfvsd
Attributes
-
delay
1
-
install
false
-
install_file
qwedadw.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4200 Client.exe 4200 Client.exe 4200 Client.exe 4200 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4200 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4200 Client.exe