General
-
Target
4fa7b1eec1fc84eb3a13c29e5a37aae7.bin
-
Size
35KB
-
Sample
240620-b3mlrawdlp
-
MD5
0c679556a86358d4c3c823bb12ac64ff
-
SHA1
ec11e0ca63065d05f234f567c84410ff86926aad
-
SHA256
afd460b1472949ba5324e6461d892ab47199157022961ef3db979b3e4d41cc9a
-
SHA512
0d720cefefe882982d33cfcd93ee7b998cbfc6f24cdc456801bc6337363adc85cf53ca2ca943eb35835539033815795f28781a76d4dee18e7b7b58e2c388f197
-
SSDEEP
768:46tNnAHBNcrW/7s0BLGxz76t4Si2VJe2RW7NlZeipHVQDsLNkZ0I:46txeYW/7HBLG176Y2VJe7TIY1QYLNdI
Behavioral task
behavioral1
Sample
5f5aa560b9b2d9f7ea3b9a4e05b9b9b35107dc78bd763000fe05f6b3f998f311.exe
Resource
win7-20240221-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Default
72.5.43.15:4449
yezcydjwbxouz
-
delay
1
-
install
true
-
install_file
win.exe
-
install_folder
%AppData%
Targets
-
-
Target
5f5aa560b9b2d9f7ea3b9a4e05b9b9b35107dc78bd763000fe05f6b3f998f311.exe
-
Size
73KB
-
MD5
4fa7b1eec1fc84eb3a13c29e5a37aae7
-
SHA1
dfff9fceeb4d74d7e82f9f0a65d1889fa0f9e326
-
SHA256
5f5aa560b9b2d9f7ea3b9a4e05b9b9b35107dc78bd763000fe05f6b3f998f311
-
SHA512
5e36a5589499a3db56d78de1b66a9ee57a2972bc57bf4b915df9118fd2a584c74ba00c61531d922431b72e87f9c53585c4c1a78a2aba122a22ea5e3603aa06ba
-
SSDEEP
1536:KIUme0cxdlOH4PAI7Bn3h36rAi8EjZUPMwC/eqmmRhdWVH1bfbfPmjmwzUYbVclN:KIUm3cxdlOH4YI7Bn3h36rAi8EVUPMwv
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-