General

  • Target

    45a4b5682899474927c9184aaeeed2a0.exe

  • Size

    41KB

  • Sample

    220120-ynph5abdd3

  • MD5

    45a4b5682899474927c9184aaeeed2a0

  • SHA1

    07106912a9aff461a3b4e8201474e0a70c0c4afa

  • SHA256

    7edb2695de8a294a93f6ad48edb3b1e8199fbfbed4a6dd78c180e3c29e7eaae6

  • SHA512

    4b7206bb343e9bf0694f732a282a71bf24fbf3520656bb186323091762b64d8dbf4c4cd580e6f93ef5a1478ab6af47fef1a6264f51d380d23f40792478a1b161

Malware Config

Extracted

Family

asyncrat

Version

VenomRAT_HVNC 5.0.4

Botnet

Venom Clients

C2

188.119.112.140:4449

Mutex

Venom_RAT_Mutex_Venom_RAT

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    0

  • install

    true

  • install_file

    CvkjdhfWr.exe

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Targets

    • Target

      45a4b5682899474927c9184aaeeed2a0.exe

    • Size

      41KB

    • MD5

      45a4b5682899474927c9184aaeeed2a0

    • SHA1

      07106912a9aff461a3b4e8201474e0a70c0c4afa

    • SHA256

      7edb2695de8a294a93f6ad48edb3b1e8199fbfbed4a6dd78c180e3c29e7eaae6

    • SHA512

      4b7206bb343e9bf0694f732a282a71bf24fbf3520656bb186323091762b64d8dbf4c4cd580e6f93ef5a1478ab6af47fef1a6264f51d380d23f40792478a1b161

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks