General
-
Target
F-M-E V2 @RFREE.exe
-
Size
1001KB
-
Sample
240713-wbpx1sshme
-
MD5
20f79abbb22e4ce80d8d91347945472b
-
SHA1
5decdd32943e35c11e89d60aa359be115179b732
-
SHA256
c1dc64a3e60375c031e62f0e04c48817752d67f55a047aa62a3058052067f6a9
-
SHA512
3cbfbd778ded7f8fb07129664ec4d0672603088edc717e671970bd222c989625a126f5f8a7658f4b343cce3cf48597ef81f32d7349c2b993a65778158d8994d4
-
SSDEEP
24576:QWmAu6LxlLQKjgl72Dyhg+XddI3rkbCTkQHwqgzJvAH:dLLDkogl72mRXEbqkkQH2o
Static task
static1
Behavioral task
behavioral1
Sample
F-M-E V2 @RFREE.exe
Resource
win11-20240709-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
xdatarfree.ddns.net:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
F-M-E V2 @RFREE.exe
-
Size
1001KB
-
MD5
20f79abbb22e4ce80d8d91347945472b
-
SHA1
5decdd32943e35c11e89d60aa359be115179b732
-
SHA256
c1dc64a3e60375c031e62f0e04c48817752d67f55a047aa62a3058052067f6a9
-
SHA512
3cbfbd778ded7f8fb07129664ec4d0672603088edc717e671970bd222c989625a126f5f8a7658f4b343cce3cf48597ef81f32d7349c2b993a65778158d8994d4
-
SSDEEP
24576:QWmAu6LxlLQKjgl72Dyhg+XddI3rkbCTkQHwqgzJvAH:dLLDkogl72mRXEbqkkQH2o
Score10/10-
Async RAT payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-