General

  • Target

    ecc6b2506aeaac13da0562a6a5d35c802eea9c6232c49cc4583d7c5c13bbbc0f

  • Size

    633KB

  • Sample

    240616-lrpbbasejm

  • MD5

    0ee9a0317342d545c2bfd9e3fbd627f9

  • SHA1

    b75bbb5092930bbbe83de54a50805bf1a7445762

  • SHA256

    ecc6b2506aeaac13da0562a6a5d35c802eea9c6232c49cc4583d7c5c13bbbc0f

  • SHA512

    929153c2589614b4495e4c7e40e07ee3c3f8b2557927aacde1e7ec8828a14162ca47c573822a201633b535d65adc1025d8bc3e730f51160759cc3af2ed6d3c70

  • SSDEEP

    12288:V+yk7FJmVUOsBuZXcdmpx1UfKpYXwtc5GpXvGpX:oy46Utisdm/CfZWc5GJvGJ

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.2

Botnet

Undram

C2

surveyedgesoft.com:60647

Mutex

jsplnctdzqfqmoruvl

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      ecc6b2506aeaac13da0562a6a5d35c802eea9c6232c49cc4583d7c5c13bbbc0f

    • Size

      633KB

    • MD5

      0ee9a0317342d545c2bfd9e3fbd627f9

    • SHA1

      b75bbb5092930bbbe83de54a50805bf1a7445762

    • SHA256

      ecc6b2506aeaac13da0562a6a5d35c802eea9c6232c49cc4583d7c5c13bbbc0f

    • SHA512

      929153c2589614b4495e4c7e40e07ee3c3f8b2557927aacde1e7ec8828a14162ca47c573822a201633b535d65adc1025d8bc3e730f51160759cc3af2ed6d3c70

    • SSDEEP

      12288:V+yk7FJmVUOsBuZXcdmpx1UfKpYXwtc5GpXvGpX:oy46Utisdm/CfZWc5GJvGJ

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks