![]() ![]() Figure 4 – Features comparison of Old & New versions of Venom RAT The image below shows the new features added in the latest version of Venom RAT. The latest version of Venom RAT is updated with stealer module that collects victims’ sensitive information such as passwords, history, autofill, bookmarks, and cookies from various browsers and exfiltrates it to the TA’s C&C server. The RAT can also perform operations such as Anti-kill (prevents termination of the RAT client), creating mutex, start-up entry for persistence, changing the RAT client icon, client name, and encrypted connection with its Command and Control (C&C) server. Enable/Disable the task manager & registry editor.Show/Hide Taskbar, start button, explorer, clock, tray & mouse pointer. ![]() ![]() Using an active scheduler to achieve multitaskingĪdditionally, the Venom RAT has the below REMOTE FUN capabilities in the victim’s machine.Downloading and executing files into disk/memory.Utilizing the system’s Microphone to record.Performing reverse proxy attacks and UAC exploits.Controlling File manager, Task manager, and Registry editor.The malware also supports the following REMOTE SYSTEM features on the victim’s system: Launching hidden Browsers such as Chrome, Firefox, Edge, Internet Explorer, Pale Moon & Pale Waterfox.Launching hidden Explorer and PowerShell.The old Version of Venom RAT has various features, including HVNC, allowing TAs to gain access to the infected system and perform the below activities in the victim’s machine. Old Version of Venom RAT and Its Features: The TA also provides VPS (Virtual Private Server) servers as a BULLETPROOF service with the features mentioned in the figure below. The TA sells Venom malware with the following plans: Figure 2 – Price details of Venom RAT malware Figure 1 – Homepage of Venom software site The below image shows the homepage of the Venom RAT site. ![]() The older version of the Venom software contains the functionalities such as Remote access, HVNC (Hidden Virtual Network Computing – taking control of a victim’s computer without their knowledge), keylogger, etc. The newest version of venom RAT has a stealer module that steals sensitive information and exfiltrates the stolen data from the victim’s machine to its C&C server. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |