General
-
Target
ecc6b2506aeaac13da0562a6a5d35c802eea9c6232c49cc4583d7c5c13bbbc0f
-
Size
633KB
-
Sample
240616-lrpbbasejm
-
MD5
0ee9a0317342d545c2bfd9e3fbd627f9
-
SHA1
b75bbb5092930bbbe83de54a50805bf1a7445762
-
SHA256
ecc6b2506aeaac13da0562a6a5d35c802eea9c6232c49cc4583d7c5c13bbbc0f
-
SHA512
929153c2589614b4495e4c7e40e07ee3c3f8b2557927aacde1e7ec8828a14162ca47c573822a201633b535d65adc1025d8bc3e730f51160759cc3af2ed6d3c70
-
SSDEEP
12288:V+yk7FJmVUOsBuZXcdmpx1UfKpYXwtc5GpXvGpX:oy46Utisdm/CfZWc5GJvGJ
Static task
static1
Behavioral task
behavioral1
Sample
ecc6b2506aeaac13da0562a6a5d35c802eea9c6232c49cc4583d7c5c13bbbc0f.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
ecc6b2506aeaac13da0562a6a5d35c802eea9c6232c49cc4583d7c5c13bbbc0f.exe
Resource
win11-20240508-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Undram
surveyedgesoft.com:60647
jsplnctdzqfqmoruvl
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
ecc6b2506aeaac13da0562a6a5d35c802eea9c6232c49cc4583d7c5c13bbbc0f
-
Size
633KB
-
MD5
0ee9a0317342d545c2bfd9e3fbd627f9
-
SHA1
b75bbb5092930bbbe83de54a50805bf1a7445762
-
SHA256
ecc6b2506aeaac13da0562a6a5d35c802eea9c6232c49cc4583d7c5c13bbbc0f
-
SHA512
929153c2589614b4495e4c7e40e07ee3c3f8b2557927aacde1e7ec8828a14162ca47c573822a201633b535d65adc1025d8bc3e730f51160759cc3af2ed6d3c70
-
SSDEEP
12288:V+yk7FJmVUOsBuZXcdmpx1UfKpYXwtc5GpXvGpX:oy46Utisdm/CfZWc5GJvGJ
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-