General
-
Target
fe5b63a9cc4bac39782f2d49bd0bbd4b2e5f53958f1d9114c271d0a045e29428.zip
-
Size
53.8MB
-
Sample
230508-rnp2bsba64
-
MD5
47178795244517b11578662488a27696
-
SHA1
62c3d857c419a42e15e0c1f3ff1571960db97bca
-
SHA256
21d0a059e0a371467629cbc277faf8658c8568737e50699bb8c03d5bb24bff7c
-
SHA512
7e06df5d4e8b6ab8892595f05fbb0efcb2e1505d1da33bddd012dcbb0f557368ee776458f80848c0f42ff8457f47e9b16096466161fcdee8d7eb7f1d2ffe9941
-
SSDEEP
1572864:V6Tt7UL54d29p7gM5+KKhTp2RzPjDF6SvJBNFUYO9:w++tKKhdETjjJBs39
Static task
static1
Behavioral task
behavioral1
Sample
fe5b63a9cc4bac39782f2d49bd0bbd4b2e5f53958f1d9114c271d0a045e29428.exe
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
Venom Pwn3rzs' Edtition v6.0.1
Default
bvofdkwdajullol
-
delay
1
-
install
true
-
install_file
Service.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/HkizZghN
Targets
-
-
Target
fe5b63a9cc4bac39782f2d49bd0bbd4b2e5f53958f1d9114c271d0a045e29428
-
Size
53.8MB
-
MD5
c7828b5c276a723a6c828af7ffd658fc
-
SHA1
813c3c5291fc87b297ab841f5aa39d2cac8efd37
-
SHA256
fe5b63a9cc4bac39782f2d49bd0bbd4b2e5f53958f1d9114c271d0a045e29428
-
SHA512
13d087189104a4613ddb5910e8a788ded7d05da62569cfc1eab3f1b59212db529e0b1c59f2114141504b0658b9a51eb4b64aa1aa3e5a08b1d9e7b5b70e360c2a
-
SSDEEP
1572864:m74ZKXqZ4HiHJYcmnyGndMnyWzvcEW7ohERwr0CuKgtvp:L8qZeiHJY1Nd3WDp+w4Cujtx
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-