Resubmissions

09-01-2023 12:41

230109-pwzjmahf3z 10

09-01-2023 12:31

230109-pp2qeahe91 10

General

  • Target

    98bb7310f473f8151d19643afb9142c0.exe

  • Size

    915KB

  • Sample

    230109-pp2qeahe91

  • MD5

    98bb7310f473f8151d19643afb9142c0

  • SHA1

    470d392167d337c8c64f02298f8c47f11385c188

  • SHA256

    b77a024602ae648ad80a3fd49f08a26b99c377b81b189b60f474437ab13205b4

  • SHA512

    0ba43ae3b0727738c959a57db161724957e1ac0e05dddcf5e97de65565472689a5d73c682be1117b3b8bb58b1f1f191703fe2c536f344c4c7a304816f70660fa

  • SSDEEP

    12288:aY60OiHviUznMCR0O0JMRZe+3gyJ+s7RYdWbNo5EET9G/Sau4qQQi5W13mWNVALF:aWZPRPZrbZq9u014

Malware Config

Extracted

Family

asyncrat

Version

VenomRAT+HVNC+Stealer Version:5.0.9

Botnet

Venom Clients

C2

185.132.176.192:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      98bb7310f473f8151d19643afb9142c0.exe

    • Size

      915KB

    • MD5

      98bb7310f473f8151d19643afb9142c0

    • SHA1

      470d392167d337c8c64f02298f8c47f11385c188

    • SHA256

      b77a024602ae648ad80a3fd49f08a26b99c377b81b189b60f474437ab13205b4

    • SHA512

      0ba43ae3b0727738c959a57db161724957e1ac0e05dddcf5e97de65565472689a5d73c682be1117b3b8bb58b1f1f191703fe2c536f344c4c7a304816f70660fa

    • SSDEEP

      12288:aY60OiHviUznMCR0O0JMRZe+3gyJ+s7RYdWbNo5EET9G/Sau4qQQi5W13mWNVALF:aWZPRPZrbZq9u014

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Async RAT payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks