General

  • Target

    file.exe

  • Size

    353KB

  • Sample

    230602-rg9r6abg23

  • MD5

    3a31f9c35ab9f26a2e9028c5b438780d

  • SHA1

    62dbb580219968fa4e4fed20703fa00dbac78666

  • SHA256

    15b5aace17bef2063e42f5956f066ee601b2dc15a657e9b3aaefb9588a7b83d7

  • SHA512

    36a93e957267c14eaee560f00217f2e9104dad8e75475bd364ce041a7c7395445afa4032a72fb1056e222d37686f0ac0171d8a3403c1873e5f1281dc55fc46b5

  • SSDEEP

    6144:Bj7y9GhvWNikQKsPDvKyG9Ih0oenrJYkcKp4ORIvY+pObV:9dcNHcvVh0oIrJfoORIvY+p+

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.1

Botnet

V365

C2

111.90.149.195:5111

111.90.149.195:7766

Mutex

4ac24af1-9eb0-4f83-aa69-9a23a66ab177

Attributes
  • delay

    2

  • install

    false

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      file.exe

    • Size

      353KB

    • MD5

      3a31f9c35ab9f26a2e9028c5b438780d

    • SHA1

      62dbb580219968fa4e4fed20703fa00dbac78666

    • SHA256

      15b5aace17bef2063e42f5956f066ee601b2dc15a657e9b3aaefb9588a7b83d7

    • SHA512

      36a93e957267c14eaee560f00217f2e9104dad8e75475bd364ce041a7c7395445afa4032a72fb1056e222d37686f0ac0171d8a3403c1873e5f1281dc55fc46b5

    • SSDEEP

      6144:Bj7y9GhvWNikQKsPDvKyG9Ih0oenrJYkcKp4ORIvY+pObV:9dcNHcvVh0oIrJfoORIvY+p+

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks