General
-
Target
35dd1e24b5d7024c28d728aa28146f910c0b9832b5dff75ce5e972b5a6f414c5
-
Size
89.0MB
-
Sample
240415-twdpdaag85
-
MD5
d49a8b14617c5ae85d30f166275a3ddc
-
SHA1
92be272e8a6d9e8cc1d2384c3c9f1dbc564a71cb
-
SHA256
35dd1e24b5d7024c28d728aa28146f910c0b9832b5dff75ce5e972b5a6f414c5
-
SHA512
5e3ba3689b3017f1349dc0143b889684fd9c8d329d0bbad73e3ba36256e0bb11886ebe85379e38941ec57268353855eb9f0bdce6928a9ea30562b5b0d81db7e9
-
SSDEEP
1572864:9VI5gzIB1whtqmF8o4hdboY/y6/twvY17cI1Cb6O5GToZhvacXrZdVCyt:DIeILotq7hJoY/p/x17TCeO5GIF1dVCw
Behavioral task
behavioral1
Sample
VenomRAT v6.0.3/Venom RAT + HVNC + Stealer + Grabber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VenomRAT v6.0.3/Venom RAT + HVNC + Stealer + Grabber.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
asyncrat
1.0.7
Default
95.216.52.21:7575
xdnqiaxygefjfoolgo
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
quasar
1.0.0.0
v3.0.0 | Venom
134.255.254.225:5050
buy-positioning.at.ply.gg:58563
buy-positioning.at.ply.gg:5050
90bea261-2bc5-4336-a086-718cd0ea9335
-
encryption_key
4A61C133F5AD65F90240BF44872C676E824A6CA7
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
1000
Targets
-
-
Target
VenomRAT v6.0.3/Venom RAT + HVNC + Stealer + Grabber.exe
-
Size
26.1MB
-
MD5
a8776c9984c7b6c4f18bf0505ca939b5
-
SHA1
e23a41b6f03f11d3b6a64d5645fa102f373bd292
-
SHA256
5dbb0f9df5fc34b49f0e284afe9037206c29dd8e50f0adbbcca785dcca89592e
-
SHA512
9ebb8d42d1649cb2b3e97bd703d5daa4b1a87f21949c279335f5b0ee834ef185be473e23f82f0562a0f22c1e54675259113c6555976aee5b5def2087b34a8398
-
SSDEEP
786432:/h9/AxUNfm9O7HYazcKB9rZsiqS+r+/hGykCCU1:/h9YxUNpTYGRQGhGykCC
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Drops file in System32 directory
-