General
-
Target
MonkeModManager-x64.bat
-
Size
82KB
-
Sample
240517-2y5jwafe41
-
MD5
95e787e067cc510309e9923ea23faa6e
-
SHA1
5d7b2761b524838ee5924859d6d76aa027d4f19e
-
SHA256
2e7f39603dfb1568c97a8617d3fb214593c3ef2cc4091d0998fe9fb01ffa3176
-
SHA512
3a8d5803e2ad459004217679d644832007505a076a80b9063ba6d33758d3ec66d7253591e0834ec4e90b911cc0615b05fb7d4d6e66d3ab5aa7f0ef5d197ebaa9
-
SSDEEP
1536:Fa5C7MKLKetgqr6HtarNaP+Zf70dnuBXxJ3ZnQiF/Kku:KCYvzarIRluLnp0ku
Static task
static1
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
qqbbltrgyug
-
delay
3
-
install
false
-
install_file
wsappx.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/VPdbUMTj
Targets
-
-
Target
MonkeModManager-x64.bat
-
Size
82KB
-
MD5
95e787e067cc510309e9923ea23faa6e
-
SHA1
5d7b2761b524838ee5924859d6d76aa027d4f19e
-
SHA256
2e7f39603dfb1568c97a8617d3fb214593c3ef2cc4091d0998fe9fb01ffa3176
-
SHA512
3a8d5803e2ad459004217679d644832007505a076a80b9063ba6d33758d3ec66d7253591e0834ec4e90b911cc0615b05fb7d4d6e66d3ab5aa7f0ef5d197ebaa9
-
SSDEEP
1536:Fa5C7MKLKetgqr6HtarNaP+Zf70dnuBXxJ3ZnQiF/Kku:KCYvzarIRluLnp0ku
-
Async RAT payload
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies Windows Firewall
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Account Manipulation
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2