General
-
Target
Client (3).exe
-
Size
170KB
-
Sample
240712-brhtessgnn
-
MD5
12e347cf5ba0b74e0f93b8759d1d99cb
-
SHA1
fe0341f382947c8303cdbf400729c441aca184e0
-
SHA256
1d7d7e2b90752b9ae4b7cd7db8b62cb0dddee15aa0d6102efd3bb29691ab0fa7
-
SHA512
3ee3d406322b7f0decb06d52951a20f99358be0dd7feeebd4e0784f2a438e33437b806bcadae32827b51da529a17b63fef763932ee571729de740fd06ec62a9e
-
SSDEEP
3072:JUacxyNl+GPMV3e9VdQsH1bfkBQXv7Jh1fRu1e16kWOIo0tnBBY:J1l+GPMV3aesVb8Bkb139Yo05f
Behavioral task
behavioral1
Sample
Client (3).exe
Resource
win7-20240704-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
147.185.221.21:4449
147.185.221.21:6703
147.185.221.21:5552
wvpjsbhmwvbzxetbd
-
delay
1
-
install
true
-
install_file
mm.exe
-
install_folder
%AppData%
Targets
-
-
Target
Client (3).exe
-
Size
170KB
-
MD5
12e347cf5ba0b74e0f93b8759d1d99cb
-
SHA1
fe0341f382947c8303cdbf400729c441aca184e0
-
SHA256
1d7d7e2b90752b9ae4b7cd7db8b62cb0dddee15aa0d6102efd3bb29691ab0fa7
-
SHA512
3ee3d406322b7f0decb06d52951a20f99358be0dd7feeebd4e0784f2a438e33437b806bcadae32827b51da529a17b63fef763932ee571729de740fd06ec62a9e
-
SSDEEP
3072:JUacxyNl+GPMV3e9VdQsH1bfkBQXv7Jh1fRu1e16kWOIo0tnBBY:J1l+GPMV3aesVb8Bkb139Yo05f
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-