General
-
Target
1331ae5fedc50718ee7ae4f73735ac7ca34e3756f3c75c843c8676a9f3db33ad.bat
-
Size
65KB
-
Sample
240509-bheqeahg9z
-
MD5
963ce568ecee6a43389e1e12b60f325a
-
SHA1
2cbf2183bf67d7d2eeb98366ab9702e23e4d7c30
-
SHA256
1331ae5fedc50718ee7ae4f73735ac7ca34e3756f3c75c843c8676a9f3db33ad
-
SHA512
18c2c8dd7a1336cbd18c1d0e6659f47a8718492f37c1224c3348391b97b3c15e74108e293f2777323cec7bde6a645243a409d2d000b9b94bc7b71d4ee7ae8554
-
SSDEEP
1536:BNnIoXnDA1Chiapd336sy2r0z1k7Ew2Gr1lwtnLYT8ki:BRIGAA336sy2rSk7Ew2Gr1lKT
Static task
static1
Behavioral task
behavioral1
Sample
1331ae5fedc50718ee7ae4f73735ac7ca34e3756f3c75c843c8676a9f3db33ad.bat
Resource
win7-20240220-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.222.96.143:4449
bkfcocpkfci
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
1331ae5fedc50718ee7ae4f73735ac7ca34e3756f3c75c843c8676a9f3db33ad.bat
-
Size
65KB
-
MD5
963ce568ecee6a43389e1e12b60f325a
-
SHA1
2cbf2183bf67d7d2eeb98366ab9702e23e4d7c30
-
SHA256
1331ae5fedc50718ee7ae4f73735ac7ca34e3756f3c75c843c8676a9f3db33ad
-
SHA512
18c2c8dd7a1336cbd18c1d0e6659f47a8718492f37c1224c3348391b97b3c15e74108e293f2777323cec7bde6a645243a409d2d000b9b94bc7b71d4ee7ae8554
-
SSDEEP
1536:BNnIoXnDA1Chiapd336sy2r0z1k7Ew2Gr1lwtnLYT8ki:BRIGAA336sy2rSk7Ew2Gr1lKT
-
Async RAT payload
-
Detects executables attemping to enumerate video devices using WMI
-
Blocklisted process makes network request
-