Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20241010-en
General
-
Target
Client.exe
-
Size
74KB
-
MD5
a333fad43c6929de1a3f5f02029f1f67
-
SHA1
ab2b6e2e5ca09ebdfd5f0c862fdf0b415d16e0ba
-
SHA256
2213e3b7cdde5d64d8d51d3cd6eff3ac2077eed4099d3490bc0e398156a2aa17
-
SHA512
227dae49c018137e87ad9855d50678b96f993172db9a6ba8e69770a7f37453063bd0d3db678293d03169fb6d7368414464f6a197c285770da82895eb1cec1ac2
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/p3QzcBLVclN:8UmcxV4x7PMVee9VdQsH1bfx3QYBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
132.145.75.68:3965
ofnfvmxbbd
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ