Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 15:53
Behavioral task
behavioral1
Sample
owowooww.exe
Resource
win7-20250207-en
8 signatures
150 seconds
General
-
Target
owowooww.exe
-
Size
74KB
-
MD5
a5d197c74f9b3846ff3b7e32a3387226
-
SHA1
622c604a072f63be1f7d6c38ae16ed742edeb41d
-
SHA256
9ff1b78a5ac5c9177f0b021a029cc48a328a392542f53025763c85d516c3694b
-
SHA512
5d21f46a1553d319751a83a2b7dd18e11c0819a27c85e1bcd671e51438c0f82bf3eec8481fb36fa5bc88e723c8dc56347d97efe164962e321224c37380fc711e
-
SSDEEP
1536:1ULkcxVKpC6yPMVKe9VdQuDI6H1bf/+CPlQzcGLVclN:1UocxVENyPMVKe9VdQsH1bfFlQfBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
Mutex
htbhezixkkhscrmzee
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/L746Mrwz
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/1892-1-0x00000000003D0000-0x00000000003E8000-memory.dmp VenomRAT -
Venomrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe 1892 owowooww.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1892 owowooww.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1892 owowooww.exe