General

  • Target

    Server.exe

  • Size

    63KB

  • Sample

    240724-qb4hhsxbjj

  • MD5

    810261a5b04d3355cd3b9a368bbbf8fa

  • SHA1

    32a90b6674258268b65dc98c8aba74b6ac4cf06f

  • SHA256

    a917ead806f9c411e83a99d5c7a81754981b540988184cfad4587e2a67bb75b5

  • SHA512

    0c81ac8f2a482fd31fd216ec91879c6296bf24e81496ca54c553f5414339fe55d1d7aef706c6b017c05aff927110c22994210c6fa07b9418e0bd1d9038914ec5

  • SSDEEP

    1536:ihODHQtSfGaf2eeiIVUGbbDwDGiDpqKmY7:ihODHQtSzfveQGbbDkgz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

final-consequently.gl.at.ply.gg:10334

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    Test.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Server.exe

    • Size

      63KB

    • MD5

      810261a5b04d3355cd3b9a368bbbf8fa

    • SHA1

      32a90b6674258268b65dc98c8aba74b6ac4cf06f

    • SHA256

      a917ead806f9c411e83a99d5c7a81754981b540988184cfad4587e2a67bb75b5

    • SHA512

      0c81ac8f2a482fd31fd216ec91879c6296bf24e81496ca54c553f5414339fe55d1d7aef706c6b017c05aff927110c22994210c6fa07b9418e0bd1d9038914ec5

    • SSDEEP

      1536:ihODHQtSfGaf2eeiIVUGbbDwDGiDpqKmY7:ihODHQtSzfveQGbbDkgz

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks