General

  • Target

    VQUOHFWAS01RVBEUJAS_001.exe

  • Size

    300.0MB

  • Sample

    221014-waka5sdhe5

  • MD5

    6a82206ff1fe448ca175471b12b246ab

  • SHA1

    69b656aef476f98feb4d3303a1883026aadf22ca

  • SHA256

    df54b9860fdba9bd38a3cee13daac0ec72292701fc355d8011efcf8c37f2d2e9

  • SHA512

    0acbfb370a445e5ca1cf7dfdd586c4b533e98a8940f25db99c0a282bb3440b0008412784c940969e1d00711ff91b93780f9d6ee10105b4a7391a84f2a901c57d

  • SSDEEP

    3072:xdLp/U+4Ut4dakGX8m0hBtQNq7t/ykXww6r50iis79KaTYVY:f4q4QkXDFI5Fjhd

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT 5.0.5

Botnet

Venom Clients

C2

edwardthornton163.duckdns.org:6444

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      VQUOHFWAS01RVBEUJAS_001.exe

    • Size

      300.0MB

    • MD5

      6a82206ff1fe448ca175471b12b246ab

    • SHA1

      69b656aef476f98feb4d3303a1883026aadf22ca

    • SHA256

      df54b9860fdba9bd38a3cee13daac0ec72292701fc355d8011efcf8c37f2d2e9

    • SHA512

      0acbfb370a445e5ca1cf7dfdd586c4b533e98a8940f25db99c0a282bb3440b0008412784c940969e1d00711ff91b93780f9d6ee10105b4a7391a84f2a901c57d

    • SSDEEP

      3072:xdLp/U+4Ut4dakGX8m0hBtQNq7t/ykXww6r50iis79KaTYVY:f4q4QkXDFI5Fjhd

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks