Behavioral task
behavioral1
Sample
ohiforgot.exe
Resource
win10v2004-20250314-en
General
-
Target
ohiforgot.exe
-
Size
74KB
-
MD5
e061a0b37973b6466a192f1d18fd513b
-
SHA1
f884c6c06ef6109aa737ac9b67c7c11b73294e4a
-
SHA256
49e718675e880dc00de6fff1466604de8df962207861a54c83ff99a070512d31
-
SHA512
90dde439124f2db089ce0d0b88da3319d083ff90b84a6f7309a9b19e77873b8ddc37a5621307dc4f910511cbcdc4a85c238024c39ca811c510e76d29086046ae
-
SSDEEP
1536:2UaUcxoyR1CriPMV8H2sICH1bX/VskQzcaLVclN:2UDcxoyXkiPMV62IH1bXukQLBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:8848
81.109.5.62:4449
81.109.5.62:8848
fxgikqpbfkxg
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
Files
-
ohiforgot.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ