Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20250314-en
General
-
Target
Client.exe
-
Size
63KB
-
MD5
9f2c9855e9b10cd85629ed43ccb07bf9
-
SHA1
5bdc957a846c910b2c1d598fb3f9f20b5afb4b21
-
SHA256
54fb7dd731003276a23e97dad7e22468827fba9c7f50bbde2e5c8138aeff98e6
-
SHA512
76af4ddbc9b15589d453615b99ba96df7064e5ce49650e982aa7d68e76b2dec1e163c2f9926622c5d75a987a248009c02176b9f39f5b032bfd499d94f7d0bb83
-
SSDEEP
1536:QhB5LrUwk4XO01V5eeiIVrGbbXwkGODpqKmY7:QhB5LrUwk4XVVseXGbbXxgz
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
86.93.183.135:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ