General
-
Target
Client.exe
-
Size
275KB
-
Sample
240727-ydb52svcqj
-
MD5
d4101d2cc39349c3153cace3bb155c34
-
SHA1
513d13873f2d7d416cdb6d403b20e9cd128425df
-
SHA256
228b84ada13e534e5148ad5e7c4c9c4aacaceee624cd45beff57a9bbe67c30d3
-
SHA512
2c6351cb235b5ac4fbbd742cd4657a2310ad8f071714116600a3a285c706fccf943393ce6680486379604d661e621ea630605afbf84a87169f17791ce76e710b
-
SSDEEP
6144:fXaWPMVWaesVbepU0sNOBTunbw0/5Wpi:fXaMds4pUviinbT5Wg
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240708-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
WaveLOL
147.185.221.213:35374
%AppData%
-
delay
1
-
install
true
-
install_file
faggotry.exe
-
install_folder
%AppData%
Targets
-
-
Target
Client.exe
-
Size
275KB
-
MD5
d4101d2cc39349c3153cace3bb155c34
-
SHA1
513d13873f2d7d416cdb6d403b20e9cd128425df
-
SHA256
228b84ada13e534e5148ad5e7c4c9c4aacaceee624cd45beff57a9bbe67c30d3
-
SHA512
2c6351cb235b5ac4fbbd742cd4657a2310ad8f071714116600a3a285c706fccf943393ce6680486379604d661e621ea630605afbf84a87169f17791ce76e710b
-
SSDEEP
6144:fXaWPMVWaesVbepU0sNOBTunbw0/5Wpi:fXaMds4pUviinbT5Wg
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-