General
-
Target
https://github.com/VenomRATHVNC/VenomRAT-HVNC-5.6/releases/download/Compiled/VenomRAT-V5.6-HVNC.rar
-
Sample
240725-2raqxsshlg
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/VenomRATHVNC/VenomRAT-HVNC-5.6/releases/download/Compiled/VenomRAT-V5.6-HVNC.rar
Resource
win10v2004-20240709-en
Malware Config
Extracted
quasar
1.4.0
v15.4.1 | Venom
dofucks.com:12482
private115.duckdns.org:12482
adf10731-c83d-4166-9137-39d0b1e48856
-
encryption_key
C84CB6134701741C5122A14FACDB67C8CFA9C0AB
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
$sxr-seroxen
Extracted
asyncrat
5.0.5
Venom Clients
127.0.0.1:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
https://github.com/VenomRATHVNC/VenomRAT-HVNC-5.6/releases/download/Compiled/VenomRAT-V5.6-HVNC.rar
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Renames multiple (100) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
1Hidden Window
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
2