General

  • Target

    فينوم رات.txt

  • Size

    271B

  • Sample

    240506-zhwkxsdc87

  • MD5

    c88aef6c0f86426249f9b9bf56fc4705

  • SHA1

    4e29828dfa4bdd451ccb0da2b99d264d4ea8a703

  • SHA256

    6ba9d2abe4be109e9555c35ce930c31a3602f5d08148baabaa35582b66dcad0e

  • SHA512

    147556c3c11c9220833616ea5d4f69ceaf8f0fc0f0ac19606df32b7d8c757afc9c24fd5a4be8b563cfe708630905d77777d6ccf931419b162c191e19e4f9f419

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

127.0.0.1:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    123.exe

  • install_folder

    %Temp%

aes.plain

Extracted

Family

xworm

C2

209.25.141.181:31533

Attributes
  • Install_directory

    %Temp%

  • install_file

    INCCHECK.exe

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:3232

Attributes
  • delay

    1

  • install

    true

  • install_file

    UnregisterResize.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      فينوم رات.txt

    • Size

      271B

    • MD5

      c88aef6c0f86426249f9b9bf56fc4705

    • SHA1

      4e29828dfa4bdd451ccb0da2b99d264d4ea8a703

    • SHA256

      6ba9d2abe4be109e9555c35ce930c31a3602f5d08148baabaa35582b66dcad0e

    • SHA512

      147556c3c11c9220833616ea5d4f69ceaf8f0fc0f0ac19606df32b7d8c757afc9c24fd5a4be8b563cfe708630905d77777d6ccf931419b162c191e19e4f9f419

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Xworm Payload

    • Detect ZGRat V1

    • Xworm

      Xworm is a remote access trojan written in C#.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Async RAT payload

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks