Analysis
-
max time kernel
892s -
max time network
900s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/01/2025, 18:40
General
-
Target
venomrat client 2.exe
-
Size
74KB
-
MD5
ef308071b3c1aaf3a506d3b8bde91262
-
SHA1
d94528a753ad2d7eb5562bf29923781713f1b2fd
-
SHA256
b8255d23725e9094fcdfa49602eedaa72062a69bb3b839334e15a22f39e331ef
-
SHA512
e5a20ab076f69643eda6eef88d114a96930b7d28bfa352adad08d72bb2619a6650a3af0a5a26a0b15e3ba3c8b5ae50e989a7f0077c5f8c1731397a1e6a859190
-
SSDEEP
1536:7Uokcx4VHsC0SPMVIGmgfbYITH1b3/PvQzcyLVclN:7Ulcx4GfSPMVlmgfZH1b3XvQjBY
Malware Config
Extracted
Family
asyncrat
Version
Venom Pwn3rzs' Edtition v6.0.1
Botnet
Default
C2
127.0.0.1:4449
127.0.0.1:13648
3.67.62.142:4449
3.67.62.142:13648
192.168.132.1:4449
192.168.132.1:13648
Mutex
pqtqeocqbgg
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe 4092 venomrat client 2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4092 venomrat client 2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4092 venomrat client 2.exe