General

  • Target

    erwer.exe

  • Size

    63KB

  • Sample

    240427-mym79shf4t

  • MD5

    f37b2278ca7f7064cb00956fa2dfc9c0

  • SHA1

    a70187d714d5dcfbdaa67fbb789452e63e433812

  • SHA256

    7c680a2e8e309a90a18ec45b16af3514ecbe43d761968c6c94d76144fcba9b79

  • SHA512

    8b88b80126a86c3433c2a9f04999b0c90835ef955a1a50271d6164468585038e92716066e660915e8668a703d5029d6546d8d90bab6341a1cc4ff508b39f76b4

  • SSDEEP

    1536:shBxLDlw0eEUzsUtjTk0vfTwrGbb/wChxGCDpqKmY7:shBxLDlw0dUvtjTk0XTaGbb/Rhhgz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

127.0.0.1:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    hthtrth.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      erwer.exe

    • Size

      63KB

    • MD5

      f37b2278ca7f7064cb00956fa2dfc9c0

    • SHA1

      a70187d714d5dcfbdaa67fbb789452e63e433812

    • SHA256

      7c680a2e8e309a90a18ec45b16af3514ecbe43d761968c6c94d76144fcba9b79

    • SHA512

      8b88b80126a86c3433c2a9f04999b0c90835ef955a1a50271d6164468585038e92716066e660915e8668a703d5029d6546d8d90bab6341a1cc4ff508b39f76b4

    • SSDEEP

      1536:shBxLDlw0eEUzsUtjTk0vfTwrGbb/wChxGCDpqKmY7:shBxLDlw0dUvtjTk0XTaGbb/Rhhgz

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks