General
-
Target
las.cmd
-
Size
6KB
-
Sample
240523-t6wypshd3s
-
MD5
1b315096e07f2cbe4bb1dae37bf115e5
-
SHA1
183d4109803b7de7f8c679e5cf12d215bd6b3871
-
SHA256
e199e310df7ed728f62ded7f850def8787e53b2e35a3534d20409976dfa87728
-
SHA512
b7d3fa6cbb79537c827bf80b29c0be4b11036922717d05ae79e301071651c7a1cbcf114fa1b9b0459e874c01de24bc78d67f171ecc9bba09f0ba039a7fea2683
-
SSDEEP
96:k+m8Z1rXchtQtvV3c7FK+37kcu/WlJVhe9glzjAqvko644Omqnds29D6tCmXPWC7:B6hQOKM7kc3De9glzjFkFXCj9DACy
Static task
static1
Behavioral task
behavioral1
Sample
las.cmd
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
las.cmd
Resource
win10v2004-20240426-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
xvern429.duckdns.org:8890
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
las.cmd
-
Size
6KB
-
MD5
1b315096e07f2cbe4bb1dae37bf115e5
-
SHA1
183d4109803b7de7f8c679e5cf12d215bd6b3871
-
SHA256
e199e310df7ed728f62ded7f850def8787e53b2e35a3534d20409976dfa87728
-
SHA512
b7d3fa6cbb79537c827bf80b29c0be4b11036922717d05ae79e301071651c7a1cbcf114fa1b9b0459e874c01de24bc78d67f171ecc9bba09f0ba039a7fea2683
-
SSDEEP
96:k+m8Z1rXchtQtvV3c7FK+37kcu/WlJVhe9glzjAqvko644Omqnds29D6tCmXPWC7:B6hQOKM7kc3De9glzjFkFXCj9DACy
Score10/10-
Blocklisted process makes network request
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-