Try VMRay Platform
Filters:
File Name Category Type Verdict Actions
C:\Users\RDhJ0CNFevzX\Desktop\$77-Venom.exe Sample File Binary
Malicious
»
Also Known As C:\Windows\SysWOW64\SubDir\$77System32.exe (Accessed File)
C:\Windows\syswow64\SubDir\$77System32.exe (Dropped File, Accessed File)
MIME Type application/vnd.microsoft.portable-executable
File Size 534.50 KB
MD5 70bf98277855b77ff93fd4e1d3f057b6 Copy to Clipboard
SHA1 7a996af7a839ae34d6b07d9b4bf176f9f4476764 Copy to Clipboard
SHA256 e4b15f8ce5b80e4f7d805ecfd73311eb133b5c138d074e806a48b81584292f65 Copy to Clipboard
SSDeep 6144:M8fGrBIgrx8kFYLTiMkbT+K6krvFJWIbxli/d+WOFtSAoSYMVg9QGy3V8/GV0ji8:uPx7FYPiMO3JJA/dxOFtSYPVg9Vv Copy to Clipboard
ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Copy to Clipboard
File Reputation Information
»
Verdict
Malicious
PE Information
»
Image Base 0x00400000
Entry Point 0x00486C2E
Size Of Code 0x00084E00
Size Of Initialized Data 0x00000A00
File Type IMAGE_FILE_EXECUTABLE_IMAGE
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_I386
Compile Timestamp 2024-05-23 12:37 (UTC)
Version Information (11)
»
Comments -
CompanyName -
FileDescription -
FileVersion 2.1.0.0
InternalName $77-Venom.exe
LegalCopyright -
LegalTrademarks -
OriginalFilename $77-Venom.exe
ProductName -
ProductVersion 2.1.0.0
Assembly Version 2.1.0.0
Sections (3)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x00402000 0x00084C34 0x00084E00 0x00000200 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 6.45
.rsrc 0x00488000 0x00000800 0x00000800 0x00085000 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 4.85
.reloc 0x0048A000 0x0000000C 0x00000200 0x00085800 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ 0.1
Imports (1)
»
mscoree.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
_CorExeMain - 0x00402000 0x00086BFC 0x00084DFC 0x00000000
Memory Dumps (8)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point YARA Actions
$77-venom.exe 1 0x00260000 0x002EBFFF Relevant Image False 32-bit - False
buffer 1 0x04CFE000 0x04CFFFFF First Network Behavior False 32-bit - False
buffer 1 0x048BC000 0x048BFFFF First Network Behavior False 32-bit - False
buffer 1 0x043DD000 0x043DFFFF First Network Behavior False 32-bit - False
buffer 1 0x00189000 0x0018FFFF First Network Behavior False 32-bit - False
$77-venom.exe 1 0x00260000 0x002EBFFF First Network Behavior False 32-bit - False
$77-venom.exe 1 0x00260000 0x002EBFFF Final Dump False 32-bit - False
$77system32.exe 7 0x00940000 0x009CBFFF Relevant Image False 32-bit - False
YARA Matches (2)
»
Rule Name Rule Description Classification Score Actions
xRAT_1 xRAT malware Backdoor
5/5
QuasarRAT QuasarRAT Backdoor
5/5
C:\Users\RDhJ0CNFevzX\AppData\Roaming\Logs\05-23-2024 Dropped File Empty
Clean
»
MIME Type application/x-empty
File Size 0 Bytes (not extracted)
MD5 d41d8cd98f00b204e9800998ecf8427e Copy to Clipboard
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Copy to Clipboard
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 Copy to Clipboard
SSDeep 3:: Copy to Clipboard
ImpHash -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image