General

  • Target

    2422867b94c312c95a0b658653edad874879c561cce4b57e4594cf90e46adc5f

  • Size

    916KB

  • Sample

    221122-jb6jjsea74

  • MD5

    b568a443f327468c6aeca35087a2c7d7

  • SHA1

    344376e3455e987639103320562b64f393452c61

  • SHA256

    2422867b94c312c95a0b658653edad874879c561cce4b57e4594cf90e46adc5f

  • SHA512

    4062e6a811557cf089783764708b3fb8cb84987af5efd341e10109e7a288065aa20d281d82511e13c9a7a0d9cde0f4ca62c3de70c2cff3d2bcc27d86348c0ad9

  • SSDEEP

    12288:WKwjBPEVUsKvTPvfG77y0SszlLgBRV7he0A/VxoL1m0dZlWkiPRAQSQy4AB:jwjBcqGyNAL2VA0aiZddgpAtQy4A

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

127.0.0.1:4449

servr.jordangaming3.xyz:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      2422867b94c312c95a0b658653edad874879c561cce4b57e4594cf90e46adc5f

    • Size

      916KB

    • MD5

      b568a443f327468c6aeca35087a2c7d7

    • SHA1

      344376e3455e987639103320562b64f393452c61

    • SHA256

      2422867b94c312c95a0b658653edad874879c561cce4b57e4594cf90e46adc5f

    • SHA512

      4062e6a811557cf089783764708b3fb8cb84987af5efd341e10109e7a288065aa20d281d82511e13c9a7a0d9cde0f4ca62c3de70c2cff3d2bcc27d86348c0ad9

    • SSDEEP

      12288:WKwjBPEVUsKvTPvfG77y0SszlLgBRV7he0A/VxoL1m0dZlWkiPRAQSQy4AB:jwjBcqGyNAL2VA0aiZddgpAtQy4A

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks