Analysis
-
max time kernel
132s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/03/2025, 18:19
Behavioral task
behavioral1
Sample
da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe
-
Size
74KB
-
MD5
20353cc92d7834d83635c0273f18f625
-
SHA1
9cfe8d720b871d80acff8980ae65eaeea69dce8f
-
SHA256
da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669
-
SHA512
fde24b5fe760e05ac716e0b7ce758aaca50eec6b543ae0ee439c08dd184c5da0458ca0935281f03727d5c95400197b467880178eb7a64053839c976c4d80e399
-
SSDEEP
1536:EUzkcx4VHsC0SPMV7e9VdQuDI6H1bf/Pk29Qzc2LVclN:EUwcx4GfSPMV7e9VdQsH1bfEyQPBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
194.105.5.199:4449
Mutex
jnsakxiumevsn
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/2892-1-0x0000000000DC0000-0x0000000000DD8000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe"C:\Users\Admin\AppData\Local\Temp\da5ae3f1608f879521e389f0f2605edb54aca77d40a4fac2be3f602b47f94669.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2892