General

  • Target

    877e947467beb6827f5dec938c5c73e6b56d632a9422c4b4f4bef83cd19c0779

  • Size

    986KB

  • Sample

    221205-tyjcmsfg23

  • MD5

    9abed258d16bc74722d469f48baeccd5

  • SHA1

    f2b2d18fbd0dd22b755aea5a4f9bc1e2148cac47

  • SHA256

    877e947467beb6827f5dec938c5c73e6b56d632a9422c4b4f4bef83cd19c0779

  • SHA512

    b1d6e7f308cc8587000c097c4d7693c8d501923e3f5b7dcfc6380d071b3372dccda66f8d6beff278dec09c42d9eee7c846c37bbc821d825d31321e6490403c2b

  • SSDEEP

    12288:tPJ3fLJ8ACnT6u+kzJNolKRP1OS5+RYK4pzDfRtcg7C5dOdp5Swx7IkNP:BtWACT6uGlKhqmK4OgG5dmGw+mP

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT 5.0.5

Botnet

Venom Clients

C2

80.89.230.176:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    5

  • install

    true

  • install_file

    svshost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      877e947467beb6827f5dec938c5c73e6b56d632a9422c4b4f4bef83cd19c0779

    • Size

      986KB

    • MD5

      9abed258d16bc74722d469f48baeccd5

    • SHA1

      f2b2d18fbd0dd22b755aea5a4f9bc1e2148cac47

    • SHA256

      877e947467beb6827f5dec938c5c73e6b56d632a9422c4b4f4bef83cd19c0779

    • SHA512

      b1d6e7f308cc8587000c097c4d7693c8d501923e3f5b7dcfc6380d071b3372dccda66f8d6beff278dec09c42d9eee7c846c37bbc821d825d31321e6490403c2b

    • SSDEEP

      12288:tPJ3fLJ8ACnT6u+kzJNolKRP1OS5+RYK4pzDfRtcg7C5dOdp5Swx7IkNP:BtWACT6uGlKhqmK4OgG5dmGw+mP

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks