General
-
Target
Client.exe
-
Size
74KB
-
MD5
d458b10aa812f6f4fb248d8d0ef43b26
-
SHA1
c46d9d73c401305ca607235fb07f65200c60a2ae
-
SHA256
0d27c3fd2bd9a18177a99dd071cf55908298120370fd0ef4e102c3ddeea9169a
-
SHA512
c3f2a3b314ed63c020ccda448e96103bd3180fe8da312e1f9991403a0c2609860027b6524ceeacece5e994f833f53e3b97bc32e766f9070f6cc118b78ec6fc46
-
SSDEEP
1536:uUme0cxFVTuCGbPMVOe9VdQuDI6H1bf/bC/mnQzco6VclN:uUm3cxFVaBbPMVOe9VdQsH1bfTOwQxIY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
52.12.198.198:19843
eseqxvtccykdt
-
delay
1
-
install
true
-
install_file
idk.exe
-
install_folder
%AppData%
Signatures
Files
-
Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ