General

  • Target

    13032024_1706_windows.cmd

  • Size

    5KB

  • Sample

    240313-k271qsbc69

  • MD5

    785491421e9b7a936c34683d262e0788

  • SHA1

    98a4e2f3797b338cc0faa98b5f122aae27eb13d1

  • SHA256

    b6ee4e50033f168d033d2b58defc9429f5bed66f2bcc22a364cebe45cd20c5ef

  • SHA512

    fb3c2f37c5ddbecf65236feb05cecd7b496143a9ad30519d6d418ef9d8f5fe9cd84096faea4a37e4bead89e45e2561ef4ab6456e3d5699506df6f6d1f33d43e0

  • SSDEEP

    96:VowFJmmJtABRbPYhB4deDT0tiU/9fSa2cWzTBxdOHKsHNovFDWjU08J+5bgnFvb4:VowFJ3XgSIdeDYtiS9fSm4TBCHKsavFC

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

154.30.255.175:8890

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      13032024_1706_windows.cmd

    • Size

      5KB

    • MD5

      785491421e9b7a936c34683d262e0788

    • SHA1

      98a4e2f3797b338cc0faa98b5f122aae27eb13d1

    • SHA256

      b6ee4e50033f168d033d2b58defc9429f5bed66f2bcc22a364cebe45cd20c5ef

    • SHA512

      fb3c2f37c5ddbecf65236feb05cecd7b496143a9ad30519d6d418ef9d8f5fe9cd84096faea4a37e4bead89e45e2561ef4ab6456e3d5699506df6f6d1f33d43e0

    • SSDEEP

      96:VowFJmmJtABRbPYhB4deDT0tiU/9fSa2cWzTBxdOHKsHNovFDWjU08J+5bgnFvb4:VowFJ3XgSIdeDYtiS9fSm4TBCHKsavFC

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks