Analysis
-
max time kernel
103s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 17:38
General
-
Target
1743442683120ec6c2114e57d9fdce42484c2831360ce3d815a27ee00362cda104a82e4b1d784.dat-decoded.exe
-
Size
74KB
-
MD5
8d3287f58a888c6d36eb5a0699901034
-
SHA1
ec67928a12749d2b5cd7214efccaff1a6ea250a2
-
SHA256
21ecb046a2829cc95256bcb4ceef1e29e55b3bc2ce2dea69ede39d06c163bbe3
-
SHA512
b462961d0ab01d51c7802c05818e9b66fa09a7e3dabd1f99c4de585b8e2f3c5c882a6deff3a1f770f21672690890b9e9e50b763ce18d6ad50710a9a0f3f7dd3f
-
SSDEEP
1536:jUEkcx4VHsC0SPMVgIANAUnI3D1by/FAJQzcqLVclN:jUxcx4GfSPMVg/NAzD1byNAJQbBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
196.251.89.167:6900
Mutex
vcbkomkyscjsqqkd
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2144 1743442683120ec6c2114e57d9fdce42484c2831360ce3d815a27ee00362cda104a82e4b1d784.dat-decoded.exe 2144 1743442683120ec6c2114e57d9fdce42484c2831360ce3d815a27ee00362cda104a82e4b1d784.dat-decoded.exe 2144 1743442683120ec6c2114e57d9fdce42484c2831360ce3d815a27ee00362cda104a82e4b1d784.dat-decoded.exe 2144 1743442683120ec6c2114e57d9fdce42484c2831360ce3d815a27ee00362cda104a82e4b1d784.dat-decoded.exe 2144 1743442683120ec6c2114e57d9fdce42484c2831360ce3d815a27ee00362cda104a82e4b1d784.dat-decoded.exe 2144 1743442683120ec6c2114e57d9fdce42484c2831360ce3d815a27ee00362cda104a82e4b1d784.dat-decoded.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2144 1743442683120ec6c2114e57d9fdce42484c2831360ce3d815a27ee00362cda104a82e4b1d784.dat-decoded.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2144 1743442683120ec6c2114e57d9fdce42484c2831360ce3d815a27ee00362cda104a82e4b1d784.dat-decoded.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1743442683120ec6c2114e57d9fdce42484c2831360ce3d815a27ee00362cda104a82e4b1d784.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\1743442683120ec6c2114e57d9fdce42484c2831360ce3d815a27ee00362cda104a82e4b1d784.dat-decoded.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2144