Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 18:49
Behavioral task
behavioral1
Sample
addad.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
addad.exe
-
Size
74KB
-
MD5
ab2c109605f569b5534e2a09960cb874
-
SHA1
8efa0aa703687e4b87bb697dd7fd1f813e5c6515
-
SHA256
93acde43deba4bb15654027d4acfb4500e963aa4303ed27c46d7c00a274d0ff8
-
SHA512
29bcbfe06cc286cc97ae240b0cce2a3fe4228e2e1e0642adc945f94972395fb3efd716329f25839685929ef92b9a62fb045e79263863f368ea680af185fa5234
-
SSDEEP
1536:gUUPcxVteCW7PMVKeM7a9IEl1bm/gwKQrQzcyLVclN:gUmcxV4x7PMVz3l1bm4wxQjBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
dehblkcccgfoe
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/2848-1-0x0000000001360000-0x0000000001378000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe 2848 addad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2848 addad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2848 addad.exe