General

  • Target

    4f9f63fc9e0ac76188596bb2efd3b033

  • Size

    63KB

  • Sample

    240409-2hblvsfb37

  • MD5

    4f9f63fc9e0ac76188596bb2efd3b033

  • SHA1

    cde6775e15f73eb512f50ee824550fd64400e1cf

  • SHA256

    b7491f105a9624be5fec6a46e6932074730758bba75a6a7f74ea3e9b4d92eccb

  • SHA512

    cfeb52790f20cc558753b473c02647c6fd7635a302e0481d9d412f5029b2100f834b8c6d3f62baffcfdaeed3e5b40011cc730c6fd0f76f6ac58ae1a5a62f70ba

  • SSDEEP

    1536:4ZeNjfU/cNRPZNg/p6eeiIVrGbbXwuYGCDpqKmY7:4ZeNjfU/clCpDeXGbbXogz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

127.0.0.1:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    SVCHOSTER.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      4f9f63fc9e0ac76188596bb2efd3b033

    • Size

      63KB

    • MD5

      4f9f63fc9e0ac76188596bb2efd3b033

    • SHA1

      cde6775e15f73eb512f50ee824550fd64400e1cf

    • SHA256

      b7491f105a9624be5fec6a46e6932074730758bba75a6a7f74ea3e9b4d92eccb

    • SHA512

      cfeb52790f20cc558753b473c02647c6fd7635a302e0481d9d412f5029b2100f834b8c6d3f62baffcfdaeed3e5b40011cc730c6fd0f76f6ac58ae1a5a62f70ba

    • SSDEEP

      1536:4ZeNjfU/cNRPZNg/p6eeiIVrGbbXwuYGCDpqKmY7:4ZeNjfU/clCpDeXGbbXogz

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks