General
-
Target
ILIKEMEN.exe
-
Size
74KB
-
Sample
240503-c9tt3sfc86
-
MD5
794f06f69365a10f17c4ecae5d782749
-
SHA1
179ab7369cf041ecddda5fc696b859db139d79df
-
SHA256
183c4a07c3859758dc971abf3351f0811698fcee4f846822d807fde8bd70021e
-
SHA512
71bc81b17db3084000be4f34e25070120b497dd778136b5234026411b3ff4ca156e9ab89881f1320fb9f27991de842098ac3bbaeb2c4531886f621e0c07b18f4
-
SSDEEP
1536:eUiccx0dxCKg6PMVZ5S5KmiLHIy31bu/n16UOTQzcaLVclN:eUzcx0f9g6PMVZAAv31buxkQLBY
Behavioral task
behavioral1
Sample
ILIKEMEN.exe
Resource
win7-20240220-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:38630
147.185.221.19:4449
147.185.221.19:38630
kwdwpnspxuuttrk
-
delay
1
-
install
true
-
install_file
sup nigga.exe
-
install_folder
%AppData%
Targets
-
-
Target
ILIKEMEN.exe
-
Size
74KB
-
MD5
794f06f69365a10f17c4ecae5d782749
-
SHA1
179ab7369cf041ecddda5fc696b859db139d79df
-
SHA256
183c4a07c3859758dc971abf3351f0811698fcee4f846822d807fde8bd70021e
-
SHA512
71bc81b17db3084000be4f34e25070120b497dd778136b5234026411b3ff4ca156e9ab89881f1320fb9f27991de842098ac3bbaeb2c4531886f621e0c07b18f4
-
SSDEEP
1536:eUiccx0dxCKg6PMVZ5S5KmiLHIy31bu/n16UOTQzcaLVclN:eUzcx0f9g6PMVZAAv31buxkQLBY
-
StormKitty payload
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-