Analysis
-
max time kernel
103s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 18:54
Behavioral task
behavioral1
Sample
fuckassnigga.exe
Resource
win10v2004-20250314-en
5 signatures
150 seconds
General
-
Target
fuckassnigga.exe
-
Size
74KB
-
MD5
7f0a080603f49e28070036f5a59757ac
-
SHA1
ad00208d40e59555b0c554a02789eded4b4b19b3
-
SHA256
2e5b6cbf1996ef3b8e8acefc06db79b9d832290438287c2b2f09f4e8483c549c
-
SHA512
1b0949ff4cae007f50409395be4c33e6fd739fb18e87867929cd1b6e57d11f1f4d54aab0bf59f2c6d7e0deb5d95a639bee595c0c1bb388de114f34daaea6d6f7
-
SSDEEP
1536:SUaUcxoyR1CriPMVNDCUzmuyIBt1bQ/wuQzc+LVclN:SUDcxoyXkiPMVNDCUzjVt1bQxQXBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
127.0.0.1:8848
81.109.5.62:4449
81.109.5.62:8848
Mutex
fxgikqpbfkxg
Attributes
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/5844-1-0x0000000000830000-0x0000000000848000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 5844 fuckassnigga.exe Token: SeIncreaseQuotaPrivilege 5844 fuckassnigga.exe Token: SeSecurityPrivilege 5844 fuckassnigga.exe Token: SeTakeOwnershipPrivilege 5844 fuckassnigga.exe Token: SeLoadDriverPrivilege 5844 fuckassnigga.exe Token: SeSystemProfilePrivilege 5844 fuckassnigga.exe Token: SeSystemtimePrivilege 5844 fuckassnigga.exe Token: SeProfSingleProcessPrivilege 5844 fuckassnigga.exe Token: SeIncBasePriorityPrivilege 5844 fuckassnigga.exe Token: SeCreatePagefilePrivilege 5844 fuckassnigga.exe Token: SeBackupPrivilege 5844 fuckassnigga.exe Token: SeRestorePrivilege 5844 fuckassnigga.exe Token: SeShutdownPrivilege 5844 fuckassnigga.exe Token: SeDebugPrivilege 5844 fuckassnigga.exe Token: SeSystemEnvironmentPrivilege 5844 fuckassnigga.exe Token: SeRemoteShutdownPrivilege 5844 fuckassnigga.exe Token: SeUndockPrivilege 5844 fuckassnigga.exe Token: SeManageVolumePrivilege 5844 fuckassnigga.exe Token: 33 5844 fuckassnigga.exe Token: 34 5844 fuckassnigga.exe Token: 35 5844 fuckassnigga.exe Token: 36 5844 fuckassnigga.exe Token: SeIncreaseQuotaPrivilege 5844 fuckassnigga.exe Token: SeSecurityPrivilege 5844 fuckassnigga.exe Token: SeTakeOwnershipPrivilege 5844 fuckassnigga.exe Token: SeLoadDriverPrivilege 5844 fuckassnigga.exe Token: SeSystemProfilePrivilege 5844 fuckassnigga.exe Token: SeSystemtimePrivilege 5844 fuckassnigga.exe Token: SeProfSingleProcessPrivilege 5844 fuckassnigga.exe Token: SeIncBasePriorityPrivilege 5844 fuckassnigga.exe Token: SeCreatePagefilePrivilege 5844 fuckassnigga.exe Token: SeBackupPrivilege 5844 fuckassnigga.exe Token: SeRestorePrivilege 5844 fuckassnigga.exe Token: SeShutdownPrivilege 5844 fuckassnigga.exe Token: SeDebugPrivilege 5844 fuckassnigga.exe Token: SeSystemEnvironmentPrivilege 5844 fuckassnigga.exe Token: SeRemoteShutdownPrivilege 5844 fuckassnigga.exe Token: SeUndockPrivilege 5844 fuckassnigga.exe Token: SeManageVolumePrivilege 5844 fuckassnigga.exe Token: 33 5844 fuckassnigga.exe Token: 34 5844 fuckassnigga.exe Token: 35 5844 fuckassnigga.exe Token: 36 5844 fuckassnigga.exe