General

  • Target

    75876b62b3fdb128d9b3dfae6e9cebf0N.exe

  • Size

    261KB

  • Sample

    240728-j4855szhkb

  • MD5

    75876b62b3fdb128d9b3dfae6e9cebf0

  • SHA1

    27e2a11fc6678b8367c19bcb1b50c52c06ae740a

  • SHA256

    b87a03ff94628c6e231cc9681e5b895be4cc8e70dc8e2194367623824aea51eb

  • SHA512

    c7f3fe892e25095be5178d9308df95735dbebe8aa0d0571ff4f1ad8bbc5b4c25215f1ddb2d4042367b77191b7a8384e9ebd93b25dba22f30218383f2077eb9c1

  • SSDEEP

    3072:ThJBLTM3UfcVdoQDQlpebbSt/gZHP9Y05sK+5V4bvoUwXj3z:ThDLTM3UfquiWp8bS/Q95sK+5V4L2D

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Nagi

C2

91.188.254.203:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    windowslauncher.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      75876b62b3fdb128d9b3dfae6e9cebf0N.exe

    • Size

      261KB

    • MD5

      75876b62b3fdb128d9b3dfae6e9cebf0

    • SHA1

      27e2a11fc6678b8367c19bcb1b50c52c06ae740a

    • SHA256

      b87a03ff94628c6e231cc9681e5b895be4cc8e70dc8e2194367623824aea51eb

    • SHA512

      c7f3fe892e25095be5178d9308df95735dbebe8aa0d0571ff4f1ad8bbc5b4c25215f1ddb2d4042367b77191b7a8384e9ebd93b25dba22f30218383f2077eb9c1

    • SSDEEP

      3072:ThJBLTM3UfcVdoQDQlpebbSt/gZHP9Y05sK+5V4bvoUwXj3z:ThDLTM3UfquiWp8bS/Q95sK+5V4L2D

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks