General
-
Target
dfsdfsefsdf.exe
-
Size
314KB
-
Sample
240803-r3da3s1cqg
-
MD5
1e70b1f2dfa3d0fac7676bf4c640ab26
-
SHA1
212ec263d1ad3d8b253ab333add181f05ab29f5f
-
SHA256
01acf24e5951a2d6d9723153be9bded08a12a93eb0d2d23296e46946398ad47d
-
SHA512
599a624c274069f011c580419dab9484b1efd23881cadb1b740809c6a29325ff2d2b3b0b828ea9ba0d37e83fb524b8d5052b8a9151be56b9d6cc503cedefb9c9
-
SSDEEP
6144:CUGv5Qw2U2sdKRUtlKZIIHDmu+Bi2OQbQzyu:qvOwrrdPIauCysQP
Static task
static1
Behavioral task
behavioral1
Sample
dfsdfsefsdf.exe
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:448
127.0.0.1:30335
147.185.221.21:4449
147.185.221.21:448
147.185.221.21:30335
svgzneojcizyxlbkbtz
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
dfsdfsefsdf.exe
-
Size
314KB
-
MD5
1e70b1f2dfa3d0fac7676bf4c640ab26
-
SHA1
212ec263d1ad3d8b253ab333add181f05ab29f5f
-
SHA256
01acf24e5951a2d6d9723153be9bded08a12a93eb0d2d23296e46946398ad47d
-
SHA512
599a624c274069f011c580419dab9484b1efd23881cadb1b740809c6a29325ff2d2b3b0b828ea9ba0d37e83fb524b8d5052b8a9151be56b9d6cc503cedefb9c9
-
SSDEEP
6144:CUGv5Qw2U2sdKRUtlKZIIHDmu+Bi2OQbQzyu:qvOwrrdPIauCysQP
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-