VenomRAT

By GoldSparrow in Ransomware
Translate To:

Threat Scorecard

Popularity Rank: 18,390
Threat Level: 80 % (High)
Infected Computers: 14
First Seen: February 22, 2024
Last Seen: October 17, 2025
OS(es) Affected: Windows

VenomRAT (Remote Access Trojan) is a hacking tool that, at first glance, may appear as a legitimate application. The creators of the VenomRAT present this tool as a genuine utility named ‘Venom Software,’ which is meant for surveillance of employees and family members. However, it is clear that this is nothing more than a disguise for a threatening piece of malware.

Users who want to subscribe to the services of the VenomRAT would have to pay $150 per month. The VenomRAT is a malware-as-a-commodity service, which can be purchased from a publicly available Web page. Users who subscribe to the VenomRAT also will receive a step-by-step guide and multiple videos, which outline how one should set up the hacking tools and how to deploy it in an attack. The fact that anyone can get their hands on the VenomRAT and that there are detailed instructions on how to use it, make this Trojan very threatening.

Once the VenomRAT is installed on a targeted host, it will be able to:

  • Open hidden Web browser pages.
  • Deploy an infostealer module, which collects important files, sensitive data, browser information, etc.
  • Deploy a keylogging module used to collect the keystrokes of the victim.
  • Establish a hidden remote desktop connection.
  • Run remote commands.
  • Transfer files between the C&C (Command & Control) server of the attackers and the infected system.
  • Use the host’s camera to record video.
  • Use the host’s microphone to record audio.

It is clear that the VenomRAT is not a threat we can underestimate. This malware is capable of collecting a wide range of files and data from its targets. Make sure your PC is protected by an up-to-date, trustworthy anti-virus software suite, which will not allow pests like the VenomRAT anywhere near your data and your system.

Analysis Report

General information

Family Name: Trojan.VenomRat
Signature status: No Signature

Known Samples

MD5: 442c95dc93b58bd987170b6410333c67
SHA1: f33a0db78fa837c877a900e8678c2ec1d2ee93ea
SHA256: 36977FDFA8B087164E257C280EAB06711591D56515C8F2F0BB2A58AC79D010DD
File Size: 335.36 KB, 335360 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 5.0.5.0
File Description Venom RAT + HVNC
File Version 5.0.5
Internal Name Client.exe
Legal Copyright Copyright © 2022
Original Filename Client.exe
Product Name Venom
Product Version 5.0.5

File Traits

  • .NET
  • ntdll
  • x86

Block Information

Total Blocks: 132
Potentially Malicious Blocks: 90
Whitelisted Blocks: 39
Unknown Blocks: 3

Visual Map

0 x x 0 0 0 x 0 x x 0 0 x x x x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 x x 0 0 0 x 0 x 0 x x x 0 ? x x x x x x x x x x x x x x ? ? 0 x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x 0 x x x x x x x x x x x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Agent.F
  • MSIL.DllInject.R
  • MSIL.DllInject.RE

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreatePrivateNamespace
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateThreadEx
Show More
  • ntdll.dll!NtDelayExecution
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationJobObject
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWriteFile
  • UNKNOWN
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Encryption Used
  • BCryptOpenAlgorithmProvider

Trending

Most Viewed

Loading...