General

  • Target

    Venom RAT + HVNC + Stealer + Grabber.exe

  • Size

    6.8MB

  • Sample

    240712-ch1tbathkk

  • MD5

    03aa135fd7386c36c636dd780f579d68

  • SHA1

    58efdd2ed92f8c63ea1409fb3a42164beeb14d9f

  • SHA256

    de7c7e2bd5041a2dfa106083d5742b29d0ae6b2a215f6d9a8407a82add97fbb0

  • SHA512

    e6b54eb7743329d20a6b75d41971a96f694273586f5c7a91a32ed363df23f94914ec1d979852e2e524c3f852766154f994780de3f8ed526c8154827e5c6a73b7

  • SSDEEP

    196608:OFy4Ju//4s1xnnDQhuWUx+BKwWS+YdU30DR7Z:eBu4gnDFuESSED7

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Discord

C2

181.47.208.50:4449

Mutex

yqhbuwfankgiktwqwmr

Attributes
  • delay

    1

  • install

    true

  • install_file

    Microsoft Update.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Venom RAT + HVNC + Stealer + Grabber.exe

    • Size

      6.8MB

    • MD5

      03aa135fd7386c36c636dd780f579d68

    • SHA1

      58efdd2ed92f8c63ea1409fb3a42164beeb14d9f

    • SHA256

      de7c7e2bd5041a2dfa106083d5742b29d0ae6b2a215f6d9a8407a82add97fbb0

    • SHA512

      e6b54eb7743329d20a6b75d41971a96f694273586f5c7a91a32ed363df23f94914ec1d979852e2e524c3f852766154f994780de3f8ed526c8154827e5c6a73b7

    • SSDEEP

      196608:OFy4Ju//4s1xnnDQhuWUx+BKwWS+YdU30DR7Z:eBu4gnDFuESSED7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks