General
-
Target
2.hta
-
Size
12KB
-
Sample
240416-vtn8rshd71
-
MD5
a76519720925437e61593d697c22d2c3
-
SHA1
fd9e658d262708c746854082d8a00e9ff998ff95
-
SHA256
609d44617a0a2884204f59d1350ffa87cef6be04d06c42014957515a6fb12f61
-
SHA512
8be920887fde3b309df0740568840254230990a0d26ae09340a37beafccaebe5b74f9feb776d0cfbcac13b40591892319d4bf2756cbb64d66e187b7483e9a71d
-
SSDEEP
384:OSJ6w3wSSkOLjX30OxjnPC/0OOjHhw/SFfJ+RATJcJ/A4B4/JdNOJitAJ8tluNVe:OSJxgSoLjX3NxjnPC/NOjHhw/S9J+RAL
Static task
static1
Behavioral task
behavioral1
Sample
2.hta
Resource
win7-20240221-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
194.48.251.169:4449
wmdekgrrot
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
2.hta
-
Size
12KB
-
MD5
a76519720925437e61593d697c22d2c3
-
SHA1
fd9e658d262708c746854082d8a00e9ff998ff95
-
SHA256
609d44617a0a2884204f59d1350ffa87cef6be04d06c42014957515a6fb12f61
-
SHA512
8be920887fde3b309df0740568840254230990a0d26ae09340a37beafccaebe5b74f9feb776d0cfbcac13b40591892319d4bf2756cbb64d66e187b7483e9a71d
-
SSDEEP
384:OSJ6w3wSSkOLjX30OxjnPC/0OOjHhw/SFfJ+RATJcJ/A4B4/JdNOJitAJ8tluNVe:OSJxgSoLjX3NxjnPC/NOjHhw/S9J+RAL
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-