General
-
Target
Client.exe
-
Size
74KB
-
Sample
240520-zr4mwsgh2y
-
MD5
0732af861863fde1353ff7e91bccaba7
-
SHA1
f3f862807efb026c226474caabe30a9a264f1389
-
SHA256
1afd485e974691cc7709993d6d6a768cc0d27878a3831210550f28f2f4eb879f
-
SHA512
5a7e348745102dd982b19afbb3ff271d99f5342a8335da56cb8636967e7a446f381afc5b7d616c713663366824e973ff291bd0ebe0b14f95305edd77fe9ee92d
-
SSDEEP
1536:+UZgwcxiKrCfmPMVue9VdQuDI6H1bf/5DVQzcyLVclN:+UZ1cxiaUmPMVue9VdQsH1bfRDVQjBY
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10-20240404-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Test
bgohjmuoimqavxtbj
-
delay
1
-
install
true
-
install_file
Powershell.exe
-
install_folder
%AppData%
Targets
-
-
Target
Client.exe
-
Size
74KB
-
MD5
0732af861863fde1353ff7e91bccaba7
-
SHA1
f3f862807efb026c226474caabe30a9a264f1389
-
SHA256
1afd485e974691cc7709993d6d6a768cc0d27878a3831210550f28f2f4eb879f
-
SHA512
5a7e348745102dd982b19afbb3ff271d99f5342a8335da56cb8636967e7a446f381afc5b7d616c713663366824e973ff291bd0ebe0b14f95305edd77fe9ee92d
-
SSDEEP
1536:+UZgwcxiKrCfmPMVue9VdQuDI6H1bf/5DVQzcyLVclN:+UZ1cxiaUmPMVue9VdQsH1bfRDVQjBY
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-