General
-
Target
15.bat
-
Size
60KB
-
Sample
240420-jyts9scb59
-
MD5
1bf971e48ba0ca904319be9147a96c33
-
SHA1
75078fd8b6a000b848eb3f372e5f84fb58d5b98e
-
SHA256
74742f3e892f02c91b2f2dd9e1547ffe42681bb755b0f28b2dd602afb46af39e
-
SHA512
e24d8d46a962c1d659a742a1926c6628f9e88268449b36a93bba5def5390eca141903e329afd3eda70f79cc391f8391e9f15639918addc923819a3efe3dcc6d0
-
SSDEEP
1536:pdgEdB7d8SZXy3SMlwVdgC1mKRkm6DUL9:paEdNGSsSR3sKRkrDo
Static task
static1
Behavioral task
behavioral1
Sample
15.bat
Resource
win7-20240215-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.222.96.128:4449
nkvohxapain
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
15.bat
-
Size
60KB
-
MD5
1bf971e48ba0ca904319be9147a96c33
-
SHA1
75078fd8b6a000b848eb3f372e5f84fb58d5b98e
-
SHA256
74742f3e892f02c91b2f2dd9e1547ffe42681bb755b0f28b2dd602afb46af39e
-
SHA512
e24d8d46a962c1d659a742a1926c6628f9e88268449b36a93bba5def5390eca141903e329afd3eda70f79cc391f8391e9f15639918addc923819a3efe3dcc6d0
-
SSDEEP
1536:pdgEdB7d8SZXy3SMlwVdgC1mKRkm6DUL9:paEdNGSsSR3sKRkrDo
-
Async RAT payload
-
Blocklisted process makes network request
-