General
-
Target
file.exe
-
Size
672KB
-
Sample
221116-tgsjzsca33
-
MD5
fbbf2ce201380bfd14cbe5a31d2b17de
-
SHA1
f64c69abef6510dc388b4a316550bc004280c382
-
SHA256
45215b8cc47cfa93874fbf5252888163c4ea43c4aeb8ac63960e43406f9f7b40
-
SHA512
af2d81d30ac040d9ee9b3593dba40614992179a29a8df3b5ad672683fed6f7acd7e8fccf9d52d4c0307af6d9a4da161cc8cb4fa34c89aef02e8dcfc48a423f56
-
SSDEEP
3072:dahKyd2n31JS5GDPUNx7kiFwT7+JcG3xcFxuP0bLTr0xvfqtTsuD9+k:dahOTDDPUNFFG+Jca5mr0FfqFsm
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
Client6
46.3.199.101:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
Windows Security Shell.exe
-
install_folder
%AppData%
Targets
-
-
Target
file.exe
-
Size
672KB
-
MD5
fbbf2ce201380bfd14cbe5a31d2b17de
-
SHA1
f64c69abef6510dc388b4a316550bc004280c382
-
SHA256
45215b8cc47cfa93874fbf5252888163c4ea43c4aeb8ac63960e43406f9f7b40
-
SHA512
af2d81d30ac040d9ee9b3593dba40614992179a29a8df3b5ad672683fed6f7acd7e8fccf9d52d4c0307af6d9a4da161cc8cb4fa34c89aef02e8dcfc48a423f56
-
SSDEEP
3072:dahKyd2n31JS5GDPUNx7kiFwT7+JcG3xcFxuP0bLTr0xvfqtTsuD9+k:dahOTDDPUNFFG+Jca5mr0FfqFsm
Score10/10-
Async RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-