Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2025, 18:48
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
Client.exe
-
Size
73KB
-
MD5
c935015491bfbe7845a3fc158c0abdc5
-
SHA1
51162fa63f9fec4e979f88dc4c8511ac8d141c3c
-
SHA256
3245cf37b95ba2fde0d055b0a7e9224cf1ad3391d3b77f32a681e6bbb6157bef
-
SHA512
45710adae17e3ec8087966ee25f39c4d88fff6eb2bc45bd98ec6ad5fd04c00c8540279b93582b087d5e9e7780f7a865878902c1e56066f77be723be110f3c596
-
SSDEEP
1536:LUUPcxVteCW7PMVee9VdQkhDIyH1bf/qcr/Qzc33VclN:LUmcxV4x7PMVee9VdQgH1bfRQylY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
ndssbihnnph
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/4364-1-0x00000000007D0000-0x00000000007E6000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe 4364 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4364 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4364 Client.exe