General

  • Target

    953609b93c1d99dcf0c6b51696bf996de7921471b3038d35900ee5de70f0f4d6

  • Size

    865KB

  • Sample

    240708-bwp4asybpf

  • MD5

    1f63f65a13c156366bb3370c6165a153

  • SHA1

    1feb9bcacad7b70bdceee1cf72390ff31c5af10b

  • SHA256

    953609b93c1d99dcf0c6b51696bf996de7921471b3038d35900ee5de70f0f4d6

  • SHA512

    49604b1ea4a49cd19d03611523534a030968d0797d1144c13368fb416cb5e4504e45fc129a822c2a5a043eb427763faa97a3df2fa33b29fd33cab3338b5f30b4

  • SSDEEP

    24576:aZh13xqP7FxDhfSbWwEVjUc5jth0+hf3k:UUPXtfSbWXVJjwK

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

Mutex

lol.exe

Attributes
  • delay

    1

  • install

    true

  • install_file

    lol.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      953609b93c1d99dcf0c6b51696bf996de7921471b3038d35900ee5de70f0f4d6

    • Size

      865KB

    • MD5

      1f63f65a13c156366bb3370c6165a153

    • SHA1

      1feb9bcacad7b70bdceee1cf72390ff31c5af10b

    • SHA256

      953609b93c1d99dcf0c6b51696bf996de7921471b3038d35900ee5de70f0f4d6

    • SHA512

      49604b1ea4a49cd19d03611523534a030968d0797d1144c13368fb416cb5e4504e45fc129a822c2a5a043eb427763faa97a3df2fa33b29fd33cab3338b5f30b4

    • SSDEEP

      24576:aZh13xqP7FxDhfSbWwEVjUc5jth0+hf3k:UUPXtfSbWXVJjwK

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks