General

  • Target

    c39754c0eb845d1fa60618c95519d430fef1d5e537baf83f63a67c8b0ef9c709.hta

  • Size

    13KB

  • Sample

    240509-ce7gpacc6v

  • MD5

    18dbd534f0a9f76cfb874a7a7e688c90

  • SHA1

    1bdad469ec9dcc975e1a95abdcaa2d7881b3ad81

  • SHA256

    c39754c0eb845d1fa60618c95519d430fef1d5e537baf83f63a67c8b0ef9c709

  • SHA512

    71dfd6053725344b3e41b9722986da8562c7e3bcb53386eb5fc2ff769b025a71d0701ba60a759f4b660987d2b7ca4a2cbe037085e05202582a51c6fd25af9e57

  • SSDEEP

    384:17RaKJD8W7aauapKCE+1GW3lglBTlp3WzlmjlVgbC5972:17RaKJD8W7aauapKCE+1GWV4Bxp3WRmg

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

193.222.96.143:4449

Mutex

bkfcocpkfci

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      c39754c0eb845d1fa60618c95519d430fef1d5e537baf83f63a67c8b0ef9c709.hta

    • Size

      13KB

    • MD5

      18dbd534f0a9f76cfb874a7a7e688c90

    • SHA1

      1bdad469ec9dcc975e1a95abdcaa2d7881b3ad81

    • SHA256

      c39754c0eb845d1fa60618c95519d430fef1d5e537baf83f63a67c8b0ef9c709

    • SHA512

      71dfd6053725344b3e41b9722986da8562c7e3bcb53386eb5fc2ff769b025a71d0701ba60a759f4b660987d2b7ca4a2cbe037085e05202582a51c6fd25af9e57

    • SSDEEP

      384:17RaKJD8W7aauapKCE+1GW3lglBTlp3WzlmjlVgbC5972:17RaKJD8W7aauapKCE+1GWV4Bxp3WRmg

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Detects executables attemping to enumerate video devices using WMI

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

MITRE ATT&CK Enterprise v15

Tasks