Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 15:23
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Client.exe
-
Size
74KB
-
MD5
5b1f7f243956595af2cef317a273275e
-
SHA1
f6bcfbc268be9c272559f7345d1684b27d983fe1
-
SHA256
c29bc00a3915c04961b3a25c499c3c9f43c33c6b484c00df4a5c8b3695344bea
-
SHA512
1979d0564afeeaec460c86179707ff29da602ab1c66958453c52816f99e863665cdb0f08bb5b540615c8f54b752dc8ba8bb655a15b52eb5a0c5d4d9d33dccfbf
-
SSDEEP
1536:EUzkcx4VHsC0SPMV7e9VdQuDI6H1bf/0dmIQzc2LVclN:EUwcx4GfSPMV7e9VdQsH1bfEmIQPBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
127.0.0.1:8000
127.0.0.1:64240
193.161.193.99:4449
193.161.193.99:8000
193.161.193.99:64240
Mutex
oklwlbhdlrw
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/3532-1-0x0000000000D30000-0x0000000000D48000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3532 Client.exe 3532 Client.exe 3532 Client.exe 3532 Client.exe 3532 Client.exe 3532 Client.exe 3532 Client.exe 3532 Client.exe 3532 Client.exe 3532 Client.exe 3532 Client.exe 3532 Client.exe 3532 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3532 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3532 Client.exe