General

  • Target

    15d452fc138d1b3861e3bdb0999f2d82.exe

  • Size

    65KB

  • Sample

    220707-f4pjysfgg2

  • MD5

    15d452fc138d1b3861e3bdb0999f2d82

  • SHA1

    5cfd69b9e88ef7e160586324c35c394400e61422

  • SHA256

    69af22840532cf62ee50bf6f226defff941c997fb83bb688fc9a39199cbc9f3c

  • SHA512

    e722f3329569b51f36d86fdfd9005702a84e92d479f769d9065d90e7f1a9dcb1a3082c7ab6e0f838e2befa63ac938481a02863ce534a5cf848909d9976b4d53b

Malware Config

Extracted

Family

asyncrat

Version

VenomRAT_HVNC 5.0.4

Botnet

Venom Clients

C2

45.134.140.152:60060

Mutex

naxxygtxgexddkrzk

Attributes
  • delay

    0

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      15d452fc138d1b3861e3bdb0999f2d82.exe

    • Size

      65KB

    • MD5

      15d452fc138d1b3861e3bdb0999f2d82

    • SHA1

      5cfd69b9e88ef7e160586324c35c394400e61422

    • SHA256

      69af22840532cf62ee50bf6f226defff941c997fb83bb688fc9a39199cbc9f3c

    • SHA512

      e722f3329569b51f36d86fdfd9005702a84e92d479f769d9065d90e7f1a9dcb1a3082c7ab6e0f838e2befa63ac938481a02863ce534a5cf848909d9976b4d53b

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

      suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

MITRE ATT&CK Matrix

Tasks