Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-02-2025 00:00
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
Client.exe
-
Size
74KB
-
MD5
b4af5dfc0916f3dff6112968c8cb6221
-
SHA1
878f42206193d7b55263e73fd75a0533776780d0
-
SHA256
62915867b0680c2e894d51e2a44efffaf6bc648cb1119cdce08d2fae416e4f2d
-
SHA512
7a166e203abe354e189d194f7f37fc0ef9a225907e96a7423b883b5656b20a0683d4960c432691d59aff2a07977e8bd55f39dd292bdb0136dba41c64261d614d
-
SSDEEP
1536:EUEkcx4VHsC0SPMV7e9VdQuDI6H1bf/GLQzc2LVclN:EUxcx4GfSPMV7e9VdQsH1bfyQPBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
ifzepoatyluoqrnrhc
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/1880-1-0x00000000010C0000-0x00000000010D8000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe 1880 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1880 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1880 Client.exe