General
-
Target
Venom RAT + HVNC + Stealer + Grabber.exe
-
Size
6.8MB
-
Sample
240712-ch1tbathkk
-
MD5
03aa135fd7386c36c636dd780f579d68
-
SHA1
58efdd2ed92f8c63ea1409fb3a42164beeb14d9f
-
SHA256
de7c7e2bd5041a2dfa106083d5742b29d0ae6b2a215f6d9a8407a82add97fbb0
-
SHA512
e6b54eb7743329d20a6b75d41971a96f694273586f5c7a91a32ed363df23f94914ec1d979852e2e524c3f852766154f994780de3f8ed526c8154827e5c6a73b7
-
SSDEEP
196608:OFy4Ju//4s1xnnDQhuWUx+BKwWS+YdU30DR7Z:eBu4gnDFuESSED7
Static task
static1
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Discord
181.47.208.50:4449
yqhbuwfankgiktwqwmr
-
delay
1
-
install
true
-
install_file
Microsoft Update.exe
-
install_folder
%AppData%
Targets
-
-
Target
Venom RAT + HVNC + Stealer + Grabber.exe
-
Size
6.8MB
-
MD5
03aa135fd7386c36c636dd780f579d68
-
SHA1
58efdd2ed92f8c63ea1409fb3a42164beeb14d9f
-
SHA256
de7c7e2bd5041a2dfa106083d5742b29d0ae6b2a215f6d9a8407a82add97fbb0
-
SHA512
e6b54eb7743329d20a6b75d41971a96f694273586f5c7a91a32ed363df23f94914ec1d979852e2e524c3f852766154f994780de3f8ed526c8154827e5c6a73b7
-
SSDEEP
196608:OFy4Ju//4s1xnnDQhuWUx+BKwWS+YdU30DR7Z:eBu4gnDFuESSED7
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-