General
-
Target
0040de802062e7a83c6f785781873e9c78ec3fe70b8a3c7c3274fdce08b6a6c1.lnk
-
Size
2KB
-
Sample
240712-gsk8ts1elk
-
MD5
7e7b20e421442d74655685583b4036de
-
SHA1
cf936b1fe122c6a5029c07a64a0f8674b31464af
-
SHA256
0040de802062e7a83c6f785781873e9c78ec3fe70b8a3c7c3274fdce08b6a6c1
-
SHA512
e58df7f695e08bc57c30a518f35c84b9ab70597696d579291b12c2534a06b24018920cd09f4a0652dcca9791eca207646e4ce38f03bf3650c093a8db9ffe9318
Static task
static1
Behavioral task
behavioral1
Sample
0040de802062e7a83c6f785781873e9c78ec3fe70b8a3c7c3274fdce08b6a6c1.lnk
Resource
win7-20240705-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
64.112.85.3:4449
ufaaryvntrlyhwcwq
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
0040de802062e7a83c6f785781873e9c78ec3fe70b8a3c7c3274fdce08b6a6c1.lnk
-
Size
2KB
-
MD5
7e7b20e421442d74655685583b4036de
-
SHA1
cf936b1fe122c6a5029c07a64a0f8674b31464af
-
SHA256
0040de802062e7a83c6f785781873e9c78ec3fe70b8a3c7c3274fdce08b6a6c1
-
SHA512
e58df7f695e08bc57c30a518f35c84b9ab70597696d579291b12c2534a06b24018920cd09f4a0652dcca9791eca207646e4ce38f03bf3650c093a8db9ffe9318
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Suspicious use of SetThreadContext
-