Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 11:21
General
-
Target
Client.exe
-
Size
74KB
-
MD5
3fcec835c80c0d689b77a2ef2117b64b
-
SHA1
62ee7c288a2a19dd736a297aa6dc3a8f1aa26e66
-
SHA256
80229ce9e0728a85ba1f6ad90f37da99da116e8f3c4b893bcde6a6113644e085
-
SHA512
98e05dc28a0e6297a2adb50eb7649bec80c45499cd03a6405cb0193828444bf65d33c26f026f3d4cd1847793914627def766142c626414f9c6d839bfdfa775af
-
SSDEEP
1536:EUEkcx4VHsC0SPMV7e9VdQuDI6H1bf/m+KG4Qzc2LVclN:EUxcx4GfSPMV7e9VdQsH1bf4G4QPBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
132.145.75.68:2665
132.145.75.68:3965
Mutex
oambycgokesyjglig
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/348-1-0x00000000005E0000-0x00000000005F8000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe 348 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 348 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 348 Client.exe