General
-
Target
APT malware.zip
-
Size
1.7MB
-
Sample
230923-hpl7dsdf3x
-
MD5
e592b6b828fb175e0b00840e7d79a3b8
-
SHA1
48ad32246f2fea1888e8a084258607f5a9988a24
-
SHA256
6d1374bb816d1e54b4cffae41830837e0c83985156a4b33f5dbce644bdb61de9
-
SHA512
47083251696dcf0a5b5a489a9e000c3c2c8a1d110905b4460a6862f3669db3927fec90543c93d030b22b406efb7db0dc3344e85d6c478d649e1e4afba96061f3
-
SSDEEP
49152:kboYzEp67lBFpmR35Qap7+FmUMhQlSfqUT6mz6z6:kbjz267lpSQap7tUmqSfLLz6z6
Static task
static1
Behavioral task
behavioral1
Sample
APT malware.zip
Resource
win7-20230831-en
Malware Config
Extracted
http://139.84.231.199:8080/get/CF6frm57nj/mta.dll
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.161.193.99:31507
ajmlxbvgoegjpkevdnz
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
APT malware.zip
-
Size
1.7MB
-
MD5
e592b6b828fb175e0b00840e7d79a3b8
-
SHA1
48ad32246f2fea1888e8a084258607f5a9988a24
-
SHA256
6d1374bb816d1e54b4cffae41830837e0c83985156a4b33f5dbce644bdb61de9
-
SHA512
47083251696dcf0a5b5a489a9e000c3c2c8a1d110905b4460a6862f3669db3927fec90543c93d030b22b406efb7db0dc3344e85d6c478d649e1e4afba96061f3
-
SSDEEP
49152:kboYzEp67lBFpmR35Qap7+FmUMhQlSfqUT6mz6z6:kbjz267lpSQap7tUmqSfLLz6z6
-
Async RAT payload
-
Blocklisted process makes network request
-