General
-
Target
xxx.bat
-
Size
61KB
-
Sample
240415-y7wfsahf21
-
MD5
28de2826893ab7e1f2c97521e8fb8ef7
-
SHA1
50a03746f808599f6ea91b176bc1621c21911eeb
-
SHA256
40949bfd50832f026a1f9f6797c0bfa1f8b16698188fc42ca06b04340ba562c1
-
SHA512
28f6268cb2944b2d9c76d35d0df6e23e02242bbf5d0a1556b585321a166bd3694cc2e78347d98df4ba1502d397654243ccce10b0935c92076fe12c67f688c451
-
SSDEEP
1536:NkwiNwg9/Sdqu+PZuFehHoCWryzg8jLVJTMdqEpo/LBfG:PiNw60+PZu+ICSXGxJTE8VfG
Static task
static1
Behavioral task
behavioral1
Sample
xxx.bat
Resource
win7-20240221-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.222.96.41:4449
nkvohxapain
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
xxx.bat
-
Size
61KB
-
MD5
28de2826893ab7e1f2c97521e8fb8ef7
-
SHA1
50a03746f808599f6ea91b176bc1621c21911eeb
-
SHA256
40949bfd50832f026a1f9f6797c0bfa1f8b16698188fc42ca06b04340ba562c1
-
SHA512
28f6268cb2944b2d9c76d35d0df6e23e02242bbf5d0a1556b585321a166bd3694cc2e78347d98df4ba1502d397654243ccce10b0935c92076fe12c67f688c451
-
SSDEEP
1536:NkwiNwg9/Sdqu+PZuFehHoCWryzg8jLVJTMdqEpo/LBfG:PiNw60+PZu+ICSXGxJTE8VfG
-
Async RAT payload
-
Blocklisted process makes network request
-