Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 19:12
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
General
-
Target
Client.exe
-
Size
74KB
-
MD5
ca869fce5d4ea896845c9faf30777df7
-
SHA1
23d7c3ed8b2d961b0c43c9dc09688f5f5c2412a0
-
SHA256
35195c489db28ef0062c2f87918bfebb2b49324dc1bc428b72abb6fb003f5aa7
-
SHA512
103f93419955fbb3401409b2109d59316c0f4e2d3ba474501d91d4f3b3feaef68fc770e97274663f1e904870a7e3d77515c6d8f43bcf3b27b4510b2a419cb1c9
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/Eq14bTzQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bf/0QYBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
132.145.75.68:5450
nbonbvmijrwjbil
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/296-1-0x0000000001290000-0x00000000012A8000-memory.dmp VenomRAT -
Venomrat family
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe 296 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 296 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 296 Client.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc