Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 19:34
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
Client.exe
-
Size
74KB
-
MD5
a333fad43c6929de1a3f5f02029f1f67
-
SHA1
ab2b6e2e5ca09ebdfd5f0c862fdf0b415d16e0ba
-
SHA256
2213e3b7cdde5d64d8d51d3cd6eff3ac2077eed4099d3490bc0e398156a2aa17
-
SHA512
227dae49c018137e87ad9855d50678b96f993172db9a6ba8e69770a7f37453063bd0d3db678293d03169fb6d7368414464f6a197c285770da82895eb1cec1ac2
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/p3QzcBLVclN:8UmcxV4x7PMVee9VdQsH1bfx3QYBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
132.145.75.68:3965
Mutex
ofnfvmxbbd
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/2760-1-0x00000000008D0000-0x00000000008E8000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe 2760 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2760 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2760 Client.exe