General
-
Target
rust-dotnet-crypter.exe
-
Size
348KB
-
Sample
230920-j6xvwsfa3z
-
MD5
addca39503803ebc2679b91ec072e4ea
-
SHA1
2cbc529d83090fb67f7a101c539ad319dbd84fff
-
SHA256
d759f7ea910f871740c8f5f920da899e231b285831e352c10ebe4e75ae7cb936
-
SHA512
7573259f3e566a55fb5eabf174e69842c7cdeacdc934819f6079d5e5e7f8048d6c7d500a22cc6e5422d71a2e831f7ddc605103b36ff8c51f387e7d64b0691c4a
-
SSDEEP
6144:69FXSy/ys7avHBUT9gwsEOH6x91U7VE4Po7yI77zrKMzK4Hwa:6DSmGf+T6udx9uVeGi
Static task
static1
Behavioral task
behavioral1
Sample
rust-dotnet-crypter.exe
Resource
win10-20230915-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.1
Default
185.17.0.246:4449
tdlbdptyivwkvmnhtt
-
delay
1
-
install
true
-
install_file
Chrome.exe
-
install_folder
%AppData%
Targets
-
-
Target
rust-dotnet-crypter.exe
-
Size
348KB
-
MD5
addca39503803ebc2679b91ec072e4ea
-
SHA1
2cbc529d83090fb67f7a101c539ad319dbd84fff
-
SHA256
d759f7ea910f871740c8f5f920da899e231b285831e352c10ebe4e75ae7cb936
-
SHA512
7573259f3e566a55fb5eabf174e69842c7cdeacdc934819f6079d5e5e7f8048d6c7d500a22cc6e5422d71a2e831f7ddc605103b36ff8c51f387e7d64b0691c4a
-
SSDEEP
6144:69FXSy/ys7avHBUT9gwsEOH6x91U7VE4Po7yI77zrKMzK4Hwa:6DSmGf+T6udx9uVeGi
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-