General
-
Target
Invoice.pdf.download.lnk
-
Size
148KB
-
Sample
240516-rxzxwshc6v
-
MD5
d39a73de9f109e3dba408e9481998206
-
SHA1
30651dada81443db0fde9c3a336955d27b6d9024
-
SHA256
84297536d9873d971dcc783ae2f95af8cbf32c65fccf3c8687af2ba5294b7f30
-
SHA512
09c8954ecabbeb36aeb8804858168eb1448f5894c1641a1ba5311f2b33aaeb24814734d0b1f7e777f22910c53bb9df500801907a603d8d71fba139705f444d61
-
SSDEEP
24:8WEe6Dz358m+pyAWkr+/4x+sPxZvBG0qdd79ds/Z6U/ab9Q9qFBm:8WENDzKvZbnvBG7dJ9A6U/a5QW
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.pdf.download.lnk
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Invoice.pdf.download.lnk
Resource
win10v2004-20240226-en
Malware Config
Extracted
https://invoiceinformations.com/InvoiceInfo/Evernote-Invoice
Extracted
https://invoiceinformations.com/InvoiceInfo/Evernote-Invoice
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Default
94.156.69.161:8900
94.156.69.161:4443
94.156.69.163:8900
94.156.69.163:4443
94.156.69.164:8900
94.156.69.164:4443
94.156.69.165:8900
94.156.69.165:4443
94.156.69.166:8900
94.156.69.166:4443
91.92.248.82:8900
91.92.248.82:4443
91.92.251.136:8900
91.92.251.136:4443
91.92.251.153:8900
91.92.251.153:4443
91.92.251.159:8900
91.92.251.159:4443
91.92.251.179:8900
91.92.251.179:4443
91.92.251.245:8900
91.92.251.245:4443
91.92.254.21:8900
91.92.254.21:4443
91.92.254.201:8900
91.92.254.201:4443
91.92.255.16:8900
91.92.255.16:4443
91.92.255.25:8900
91.92.255.25:4443
91.92.255.79:8900
91.92.255.79:4443
94.156.64.5:8900
94.156.64.5:4443
94.156.64.21:8900
94.156.64.21:4443
94.156.64.51:8900
94.156.64.51:4443
94.156.64.90:8900
94.156.64.90:4443
sqhylkrhlwjrecxiv
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Invoice.pdf.download.lnk
-
Size
148KB
-
MD5
d39a73de9f109e3dba408e9481998206
-
SHA1
30651dada81443db0fde9c3a336955d27b6d9024
-
SHA256
84297536d9873d971dcc783ae2f95af8cbf32c65fccf3c8687af2ba5294b7f30
-
SHA512
09c8954ecabbeb36aeb8804858168eb1448f5894c1641a1ba5311f2b33aaeb24814734d0b1f7e777f22910c53bb9df500801907a603d8d71fba139705f444d61
-
SSDEEP
24:8WEe6Dz358m+pyAWkr+/4x+sPxZvBG0qdd79ds/Z6U/ab9Q9qFBm:8WENDzKvZbnvBG7dJ9A6U/a5QW
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-