General

  • Target

    1331ae5fedc50718ee7ae4f73735ac7ca34e3756f3c75c843c8676a9f3db33ad.bat

  • Size

    65KB

  • Sample

    240509-bheqeahg9z

  • MD5

    963ce568ecee6a43389e1e12b60f325a

  • SHA1

    2cbf2183bf67d7d2eeb98366ab9702e23e4d7c30

  • SHA256

    1331ae5fedc50718ee7ae4f73735ac7ca34e3756f3c75c843c8676a9f3db33ad

  • SHA512

    18c2c8dd7a1336cbd18c1d0e6659f47a8718492f37c1224c3348391b97b3c15e74108e293f2777323cec7bde6a645243a409d2d000b9b94bc7b71d4ee7ae8554

  • SSDEEP

    1536:BNnIoXnDA1Chiapd336sy2r0z1k7Ew2Gr1lwtnLYT8ki:BRIGAA336sy2rSk7Ew2Gr1lKT

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

193.222.96.143:4449

Mutex

bkfcocpkfci

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1331ae5fedc50718ee7ae4f73735ac7ca34e3756f3c75c843c8676a9f3db33ad.bat

    • Size

      65KB

    • MD5

      963ce568ecee6a43389e1e12b60f325a

    • SHA1

      2cbf2183bf67d7d2eeb98366ab9702e23e4d7c30

    • SHA256

      1331ae5fedc50718ee7ae4f73735ac7ca34e3756f3c75c843c8676a9f3db33ad

    • SHA512

      18c2c8dd7a1336cbd18c1d0e6659f47a8718492f37c1224c3348391b97b3c15e74108e293f2777323cec7bde6a645243a409d2d000b9b94bc7b71d4ee7ae8554

    • SSDEEP

      1536:BNnIoXnDA1Chiapd336sy2r0z1k7Ew2Gr1lwtnLYT8ki:BRIGAA336sy2rSk7Ew2Gr1lKT

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Detects executables attemping to enumerate video devices using WMI

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks