General
-
Target
GoGi.bat
-
Size
60KB
-
Sample
240420-j6n8racc98
-
MD5
cab2108a81d68104dd9b15efcedf8351
-
SHA1
03852c18f75cad87f71693fb1973d9a04e8910ed
-
SHA256
a2dfe970dc385f9aa1a81946c4bc41144d182dbddb02e37ce4c5b52c9b884aaa
-
SHA512
e474ce03766f8e21fdb14e072144e8e1c5fa1f30e66ea4f7a05fade86bd783fb4dec65d23ab01861524959a0a029cb2112074116fdbd72d02ab4794216ed95f5
-
SSDEEP
1536:ts4yFTt4kNLNofpmw3dU7pVcJqmJQBULYJebJaRVmMWVXUpQk8daktj2aVv0+x/:tITGkDofH27pAD8YdYFpQk88kd2aJ/x/
Static task
static1
Behavioral task
behavioral1
Sample
GoGi.bat
Resource
win7-20240221-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.222.96.114:4449
nkvohxapain
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
GoGi.bat
-
Size
60KB
-
MD5
cab2108a81d68104dd9b15efcedf8351
-
SHA1
03852c18f75cad87f71693fb1973d9a04e8910ed
-
SHA256
a2dfe970dc385f9aa1a81946c4bc41144d182dbddb02e37ce4c5b52c9b884aaa
-
SHA512
e474ce03766f8e21fdb14e072144e8e1c5fa1f30e66ea4f7a05fade86bd783fb4dec65d23ab01861524959a0a029cb2112074116fdbd72d02ab4794216ed95f5
-
SSDEEP
1536:ts4yFTt4kNLNofpmw3dU7pVcJqmJQBULYJebJaRVmMWVXUpQk8daktj2aVv0+x/:tITGkDofH27pAD8YdYFpQk88kd2aJ/x/
-
Async RAT payload
-
Blocklisted process makes network request
-