General
-
Target
7699f94c9a81881b343ad99683317b66a1fb7d2db1491931d2cff3942f4ba15a
-
Size
250KB
-
Sample
220120-n4k6jahgh4
-
MD5
3b66b8cd79c7fd52b55f2277f9774dc3
-
SHA1
60a701a879c7dc4dd8408140c31bfff807229529
-
SHA256
7699f94c9a81881b343ad99683317b66a1fb7d2db1491931d2cff3942f4ba15a
-
SHA512
ea2dba94dd59a5538c6c07c8168571fb51cf8ba4e05e93d01bf69703712d9e2686b6aa418eb369f9107c1263ad605bda2cb33f0ed4f2217e5eb6a503c4f8f292
Static task
static1
Behavioral task
behavioral1
Sample
7699f94c9a81881b343ad99683317b66a1fb7d2db1491931d2cff3942f4ba15a.exe
Resource
win10-en-20211208
Malware Config
Extracted
smokeloader
2020
http://abpa.at/upload/
http://emaratghajari.com/upload/
http://d7qw.cn/upload/
http://alumik-group.ru/upload/
http://zamkikurgan.ru/upload/
Extracted
asyncrat
VenomRAT_HVNC 5.0.4
Venom Clients
127.0.0.1:4449
91.92.136.123:4449
Venom_RAT_Mutex_Venom_RAT
-
anti_vm
false
-
bsod
false
-
delay
0
-
install
false
-
install_folder
%AppData%
-
pastebin_config
null
Targets
-
-
Target
7699f94c9a81881b343ad99683317b66a1fb7d2db1491931d2cff3942f4ba15a
-
Size
250KB
-
MD5
3b66b8cd79c7fd52b55f2277f9774dc3
-
SHA1
60a701a879c7dc4dd8408140c31bfff807229529
-
SHA256
7699f94c9a81881b343ad99683317b66a1fb7d2db1491931d2cff3942f4ba15a
-
SHA512
ea2dba94dd59a5538c6c07c8168571fb51cf8ba4e05e93d01bf69703712d9e2686b6aa418eb369f9107c1263ad605bda2cb33f0ed4f2217e5eb6a503c4f8f292
-
Async RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-