Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2025 07:22

General

  • Target

    Venom 2.8 CRACKED - FINAL/client.exe

  • Size

    908KB

  • MD5

    0333674e04906c427f81fe7470e93259

  • SHA1

    13c6fe5d4016cf606f4fe962f2dedc20c9f3b987

  • SHA256

    540fe401c160e29529b84083108666b3925126ae7681ba11325a6ef3b6613268

  • SHA512

    ee704065dd4289853505d0fb0a0645c949e98be2f93239d912172e5f9edbbb59198494d4581ae43cb9b37ee25fa4d00b65a29431465c9a799b2be5f589f9ad2c

  • SSDEEP

    24576:FD7Y5PaGuEuICcGA60e4yETs5OK1lknB:57Y5PaGuEuICcGA60e4yEg1lk

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    5000

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Venom 2.8 CRACKED - FINAL\client.exe
    "C:\Users\Admin\AppData\Local\Temp\Venom 2.8 CRACKED - FINAL\client.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2204-0-0x0000000074C6E000-0x0000000074C6F000-memory.dmp

    Filesize

    4KB

  • memory/2204-1-0x0000000000C80000-0x0000000000D68000-memory.dmp

    Filesize

    928KB