General
-
Target
file.exe
-
Size
353KB
-
Sample
230602-rg9r6abg23
-
MD5
3a31f9c35ab9f26a2e9028c5b438780d
-
SHA1
62dbb580219968fa4e4fed20703fa00dbac78666
-
SHA256
15b5aace17bef2063e42f5956f066ee601b2dc15a657e9b3aaefb9588a7b83d7
-
SHA512
36a93e957267c14eaee560f00217f2e9104dad8e75475bd364ce041a7c7395445afa4032a72fb1056e222d37686f0ac0171d8a3403c1873e5f1281dc55fc46b5
-
SSDEEP
6144:Bj7y9GhvWNikQKsPDvKyG9Ih0oenrJYkcKp4ORIvY+pObV:9dcNHcvVh0oIrJfoORIvY+p+
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.1
V365
111.90.149.195:5111
111.90.149.195:7766
4ac24af1-9eb0-4f83-aa69-9a23a66ab177
-
delay
2
-
install
false
-
install_folder
%Temp%
Targets
-
-
Target
file.exe
-
Size
353KB
-
MD5
3a31f9c35ab9f26a2e9028c5b438780d
-
SHA1
62dbb580219968fa4e4fed20703fa00dbac78666
-
SHA256
15b5aace17bef2063e42f5956f066ee601b2dc15a657e9b3aaefb9588a7b83d7
-
SHA512
36a93e957267c14eaee560f00217f2e9104dad8e75475bd364ce041a7c7395445afa4032a72fb1056e222d37686f0ac0171d8a3403c1873e5f1281dc55fc46b5
-
SSDEEP
6144:Bj7y9GhvWNikQKsPDvKyG9Ih0oenrJYkcKp4ORIvY+pObV:9dcNHcvVh0oIrJfoORIvY+p+
Score10/10-
Async RAT payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-