Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
Venom 2.8 CRACKED - FINAL/VenomRemote_Cracked.exe
Resource
win7-20240903-en
General
-
Target
Venom 2.8 CRACKED - FINAL.7z
-
Size
26.1MB
-
MD5
312d5821bf53aa72fbae063c003fbbea
-
SHA1
411d1c1f83739cf98a1e73cf5b475a20b63bb95f
-
SHA256
0dc45546bbd24a266d52876385c3b588b05192d54289a1c130b47783e3074c8e
-
SHA512
80af7780d80c47ceb216bc5a764f642defbef19707b4b5ea71de829f43a6dad51f5b44cdac125f40cad8a7df3fcd607b6fdf5ac49f3a3459a125cddb0447ff4a
-
SSDEEP
393216:BitYCoE8ipUzRyRLKNg1/AxasrWw+GTwc481pEeeMgWv6kjXREIsmMzNGfr:BitYCvKzgPKBCw+8wz0PwWv6aapGfr
Malware Config
Extracted
quasar
-
reconnect_delay
5000
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/Venom 2.8 CRACKED - FINAL/client.bin family_quasar -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule static1/unpack001/Venom 2.8 CRACKED - FINAL/VenomRemote_Cracked.exe agile_net -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Venom 2.8 CRACKED - FINAL/VenomRemote_Cracked.exe unpack001/Venom 2.8 CRACKED - FINAL/client.bin
Files
-
Venom 2.8 CRACKED - FINAL.7z.7z
-
Venom 2.8 CRACKED - FINAL/VenomRemote_Cracked.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 38.4MB - Virtual size: 38.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Venom 2.8 CRACKED - FINAL/client.bin.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 904KB - Virtual size: 903KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Venom 2.8 CRACKED - FINAL/settings.xml