General

  • Target

    Client (3).exe

  • Size

    170KB

  • Sample

    240712-brhtessgnn

  • MD5

    12e347cf5ba0b74e0f93b8759d1d99cb

  • SHA1

    fe0341f382947c8303cdbf400729c441aca184e0

  • SHA256

    1d7d7e2b90752b9ae4b7cd7db8b62cb0dddee15aa0d6102efd3bb29691ab0fa7

  • SHA512

    3ee3d406322b7f0decb06d52951a20f99358be0dd7feeebd4e0784f2a438e33437b806bcadae32827b51da529a17b63fef763932ee571729de740fd06ec62a9e

  • SSDEEP

    3072:JUacxyNl+GPMV3e9VdQsH1bfkBQXv7Jh1fRu1e16kWOIo0tnBBY:J1l+GPMV3aesVb8Bkb139Yo05f

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

147.185.221.21:4449

147.185.221.21:6703

147.185.221.21:5552

Mutex

wvpjsbhmwvbzxetbd

Attributes
  • delay

    1

  • install

    true

  • install_file

    mm.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Client (3).exe

    • Size

      170KB

    • MD5

      12e347cf5ba0b74e0f93b8759d1d99cb

    • SHA1

      fe0341f382947c8303cdbf400729c441aca184e0

    • SHA256

      1d7d7e2b90752b9ae4b7cd7db8b62cb0dddee15aa0d6102efd3bb29691ab0fa7

    • SHA512

      3ee3d406322b7f0decb06d52951a20f99358be0dd7feeebd4e0784f2a438e33437b806bcadae32827b51da529a17b63fef763932ee571729de740fd06ec62a9e

    • SSDEEP

      3072:JUacxyNl+GPMV3e9VdQsH1bfkBQXv7Jh1fRu1e16kWOIo0tnBBY:J1l+GPMV3aesVb8Bkb139Yo05f

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks