General
-
Target
فينوم رات.txt
-
Size
271B
-
Sample
240506-zhwkxsdc87
-
MD5
c88aef6c0f86426249f9b9bf56fc4705
-
SHA1
4e29828dfa4bdd451ccb0da2b99d264d4ea8a703
-
SHA256
6ba9d2abe4be109e9555c35ce930c31a3602f5d08148baabaa35582b66dcad0e
-
SHA512
147556c3c11c9220833616ea5d4f69ceaf8f0fc0f0ac19606df32b7d8c757afc9c24fd5a4be8b563cfe708630905d77777d6ccf931419b162c191e19e4f9f419
Static task
static1
Behavioral task
behavioral1
Sample
فينوم رات.txt
Resource
win10-20240404-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
127.0.0.1:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
123.exe
-
install_folder
%Temp%
Extracted
xworm
209.25.141.181:31533
-
Install_directory
%Temp%
-
install_file
INCCHECK.exe
Extracted
asyncrat
Default
127.0.0.1:3232
-
delay
1
-
install
true
-
install_file
UnregisterResize.exe
-
install_folder
%AppData%
Targets
-
-
Target
فينوم رات.txt
-
Size
271B
-
MD5
c88aef6c0f86426249f9b9bf56fc4705
-
SHA1
4e29828dfa4bdd451ccb0da2b99d264d4ea8a703
-
SHA256
6ba9d2abe4be109e9555c35ce930c31a3602f5d08148baabaa35582b66dcad0e
-
SHA512
147556c3c11c9220833616ea5d4f69ceaf8f0fc0f0ac19606df32b7d8c757afc9c24fd5a4be8b563cfe708630905d77777d6ccf931419b162c191e19e4f9f419
-
Detect Xworm Payload
-
Detect ZGRat V1
-
Async RAT payload
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1