General
-
Target
2799308c4b285f662d2954b3d9900951d74ae0cdde04b80ff865221817103f3b.exe
-
Size
649KB
-
Sample
240312-csbbeafd22
-
MD5
b9a42052c81229de87b90370c7e8ef56
-
SHA1
8253ef8fe65f68ea7e0cc11bcdc06ec91c8d3290
-
SHA256
2799308c4b285f662d2954b3d9900951d74ae0cdde04b80ff865221817103f3b
-
SHA512
0e6a1b3d66c2401f8b8d5f8b2cae7d4912fa73565faf4c21686caa63a0d81eda952d6070edb57e7577c15c896caff3e52a6671713cfaa13ed21bab7accb86755
-
SSDEEP
12288:tOSF/ZdMP5WlYj6Fs/HI6C96D7cyTZ33a33S333333dkS9Jy9:tLrMPkDFB6+2NkeO
Static task
static1
Behavioral task
behavioral1
Sample
2799308c4b285f662d2954b3d9900951d74ae0cdde04b80ff865221817103f3b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2799308c4b285f662d2954b3d9900951d74ae0cdde04b80ff865221817103f3b.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Default
5.182.87.154:4449
jiqsvporltpvroy
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
2799308c4b285f662d2954b3d9900951d74ae0cdde04b80ff865221817103f3b.exe
-
Size
649KB
-
MD5
b9a42052c81229de87b90370c7e8ef56
-
SHA1
8253ef8fe65f68ea7e0cc11bcdc06ec91c8d3290
-
SHA256
2799308c4b285f662d2954b3d9900951d74ae0cdde04b80ff865221817103f3b
-
SHA512
0e6a1b3d66c2401f8b8d5f8b2cae7d4912fa73565faf4c21686caa63a0d81eda952d6070edb57e7577c15c896caff3e52a6671713cfaa13ed21bab7accb86755
-
SSDEEP
12288:tOSF/ZdMP5WlYj6Fs/HI6C96D7cyTZ33a33S333333dkS9Jy9:tLrMPkDFB6+2NkeO
-
PureLog Stealer payload
-
Detects executables attemping to enumerate video devices using WMI
-
Detects executables packed with SmartAssembly
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-