Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 15:44
Behavioral task
behavioral1
Sample
8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
120 seconds
General
-
Target
8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe
-
Size
74KB
-
MD5
691bc0e47a381c96ffcc10e0ce7afd10
-
SHA1
eecb7fb5afd34a029bdaefcb4a9119f4f185533f
-
SHA256
8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411
-
SHA512
9a6106a7609e9f71d7af57d14f07d3166ef70aca30334143a114108076823e67b569eda94d9655d19e610349832c1a8c9802ceb9b10c820f2bb622b7622e6098
-
SSDEEP
1536:EUckcx4VHsC0SPMV7e9VdQuDI6H1bf/ce2+Qzc2LVclN:EUpcx4GfSPMV7e9VdQsH1bf0e2+QPBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
Mutex
Rmc
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/iRj0W279
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/2376-1-0x0000000000E60000-0x0000000000E78000-memory.dmp VenomRAT -
Venomrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 37 IoCs
flow ioc 19 pastebin.com 27 pastebin.com 15 pastebin.com 22 pastebin.com 24 pastebin.com 37 pastebin.com 8 pastebin.com 9 pastebin.com 13 pastebin.com 14 pastebin.com 6 pastebin.com 10 pastebin.com 31 pastebin.com 34 pastebin.com 35 pastebin.com 38 pastebin.com 40 pastebin.com 7 pastebin.com 11 pastebin.com 16 pastebin.com 30 pastebin.com 21 pastebin.com 26 pastebin.com 4 pastebin.com 12 pastebin.com 28 pastebin.com 36 pastebin.com 39 pastebin.com 5 pastebin.com 17 pastebin.com 25 pastebin.com 33 pastebin.com 32 pastebin.com 18 pastebin.com 20 pastebin.com 23 pastebin.com 29 pastebin.com -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2376 8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe"C:\Users\Admin\AppData\Local\Temp\8d4c69f370e3a1e608f0c0deeca8b1ab1be76393c4c02cd6140d73c11dd4d411N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2376