Analysis
-
max time kernel
129s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 17:57
General
-
Target
Client.exe
-
Size
74KB
-
MD5
0b601635bd4ee178cc30afe7d4e72051
-
SHA1
dbec5361eb7e64902441fd8d205e1a96d191d735
-
SHA256
2d1f81c62216894d4840e544b0c3c8882364cfa730946d0cd02d2ce22694e50f
-
SHA512
d5499c55852a8c91a8b79e3d91202897ce6364408b3927fabbb8a20067fa8cd655973e8e1ca414a01dc67a92b0186a0156203c2f1a6b17e32b0e4e28d0b2b946
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/Jz/QzcBLVclN:8UmcxV4x7PMVee9VdQsH1bfBDQYBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
132.145.75.68:3965
132.145.75.68:2885
Mutex
ftolxmmyozfj
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/3848-1-0x0000000000B30000-0x0000000000B48000-memory.dmp VenomRAT -
Venomrat family
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3848 Client.exe 3848 Client.exe 3848 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3848 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3848 Client.exe