General
-
Target
Client.exe
-
Size
114KB
-
Sample
240710-3ydltsxcjk
-
MD5
29e928f1f16131ca36a3aae3467141de
-
SHA1
9b586f0d13236c3280e5b7b3b592309b296d7fff
-
SHA256
5e3758c19d761560431f8fd8302aa6d2061568cbed3dc0a20ad3d4f5da93a956
-
SHA512
3f4ab2b645ec82c9899061973edb92bc4ef4ef3663603dea0de3a37447b8b94577e1357f398bef02f1ce94260f53f25387de72d872a055d7a9482b1f1b256314
-
SSDEEP
3072:QUVcxhzVCiPMVSe9VdQsH1bf7ADzQL4KvYMC29TwaGwYSOeBY:QtCiPMVSaesVbUzaFzC2yK
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240708-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:6703
147.185.221.21:4449
147.185.221.21:6703
uiagdedifgkrgllefg
-
delay
1
-
install
true
-
install_file
dllhost.dat.exe
-
install_folder
%AppData%
Targets
-
-
Target
Client.exe
-
Size
114KB
-
MD5
29e928f1f16131ca36a3aae3467141de
-
SHA1
9b586f0d13236c3280e5b7b3b592309b296d7fff
-
SHA256
5e3758c19d761560431f8fd8302aa6d2061568cbed3dc0a20ad3d4f5da93a956
-
SHA512
3f4ab2b645ec82c9899061973edb92bc4ef4ef3663603dea0de3a37447b8b94577e1357f398bef02f1ce94260f53f25387de72d872a055d7a9482b1f1b256314
-
SSDEEP
3072:QUVcxhzVCiPMVSe9VdQsH1bf7ADzQL4KvYMC29TwaGwYSOeBY:QtCiPMVSaesVbUzaFzC2yK
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-