Behavioral task
behavioral1
Sample
CrackedDefault.exe
Resource
win7-20250207-en
General
-
Target
CrackedDefault.exe
-
Size
74KB
-
MD5
ee3fa50b70d2796ef1e27f5ece10edbf
-
SHA1
b41fe73491b0a2c2ae2059da96a523c3f5b587ae
-
SHA256
ee497caf223652c226571906ea5623d4a51ddc303d3e1d59443b8da17b7d29da
-
SHA512
4696604820ee75d2a171d6500a04bc4a26449fde6dc170b39f9734944a7fc26e3b4e03cb2d13ae87a9d0270666223c6fd6b3f7f3144b82c3a7392cd656ee2acb
-
SSDEEP
1536:aUXNwcxKHXwzCtmPMVOAxFI6H1bi/5Qzc+LVclN:aUXicxK8WmPMVOAPH1biRQXBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Def
qmcwkkwaroj
-
c2_url_file
https://paste.ee/r/oBfRfDEZ/0
-
delay
1
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
Signatures
Files
-
CrackedDefault.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ