General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4782
127.0.0.1:4781
127.0.0.1:4783
127.0.0.1:4784
127.0.0.1:4785
127.0.0.1:4786
127.0.0.1:4787
127.0.0.1:4788
127.0.0.1:4789
127.0.0.1:4790
127.0.0.1:4791
127.0.0.1:4792
127.0.0.1:4793
91.92.246.67:4782
91.92.246.67:4781
91.92.246.67:4783
91.92.246.67:4784
91.92.246.67:4785
91.92.246.67:4786
91.92.246.67:4787
91.92.246.67:4788
91.92.246.67:4789
91.92.246.67:4790
91.92.246.67:4791
91.92.246.67:4792
91.92.246.67:4793
gryzaavvqgfsdtn
-
delay
1
-
install
true
-
install_file
Clien64 Bootstrapper.exe
-
install_folder
%AppData%
Targets
-
-
Target
https://gofile.io/d/NhhoD3
-
StormKitty payload
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-