General
-
Target
c39754c0eb845d1fa60618c95519d430fef1d5e537baf83f63a67c8b0ef9c709.hta
-
Size
13KB
-
Sample
240509-ce7gpacc6v
-
MD5
18dbd534f0a9f76cfb874a7a7e688c90
-
SHA1
1bdad469ec9dcc975e1a95abdcaa2d7881b3ad81
-
SHA256
c39754c0eb845d1fa60618c95519d430fef1d5e537baf83f63a67c8b0ef9c709
-
SHA512
71dfd6053725344b3e41b9722986da8562c7e3bcb53386eb5fc2ff769b025a71d0701ba60a759f4b660987d2b7ca4a2cbe037085e05202582a51c6fd25af9e57
-
SSDEEP
384:17RaKJD8W7aauapKCE+1GW3lglBTlp3WzlmjlVgbC5972:17RaKJD8W7aauapKCE+1GWV4Bxp3WRmg
Static task
static1
Behavioral task
behavioral1
Sample
c39754c0eb845d1fa60618c95519d430fef1d5e537baf83f63a67c8b0ef9c709.hta
Resource
win7-20240221-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.222.96.143:4449
bkfcocpkfci
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
c39754c0eb845d1fa60618c95519d430fef1d5e537baf83f63a67c8b0ef9c709.hta
-
Size
13KB
-
MD5
18dbd534f0a9f76cfb874a7a7e688c90
-
SHA1
1bdad469ec9dcc975e1a95abdcaa2d7881b3ad81
-
SHA256
c39754c0eb845d1fa60618c95519d430fef1d5e537baf83f63a67c8b0ef9c709
-
SHA512
71dfd6053725344b3e41b9722986da8562c7e3bcb53386eb5fc2ff769b025a71d0701ba60a759f4b660987d2b7ca4a2cbe037085e05202582a51c6fd25af9e57
-
SSDEEP
384:17RaKJD8W7aauapKCE+1GW3lglBTlp3WzlmjlVgbC5972:17RaKJD8W7aauapKCE+1GWV4Bxp3WRmg
-
Async RAT payload
-
Detects executables attemping to enumerate video devices using WMI
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-