General
-
Target
2d6a4155a7d17a0cfce4ad6e8571c674.exe
-
Size
74KB
-
Sample
240804-pdqtrsygnd
-
MD5
2d6a4155a7d17a0cfce4ad6e8571c674
-
SHA1
9992d09dfac2f5445a7d29d2ab1d68b42608b348
-
SHA256
749911c61e23b64b45f28d453a8b70275f824092d8dab39ccc1e93464d26b450
-
SHA512
c6033f05cc9ec432dfe22a00aaf5461708f95954326a78c52f0c4617d50811a3ff30e99c300df28dea4530f2c952c1048d6f2c5415010b1a860c8570f45991ee
-
SSDEEP
1536:cOUt8cxqnHXC56PMVCUiLsiIyLH1bT/yDkuQzcaLVclN:cOUOcxq3O6PMV9iFLH1bT6IuQLBY
Behavioral task
behavioral1
Sample
2d6a4155a7d17a0cfce4ad6e8571c674.exe
Resource
win7-20240704-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
rufrwqqzhtx
-
delay
1
-
install
true
-
install_file
WinUpdate.exe
-
install_folder
%AppData%
Targets
-
-
Target
2d6a4155a7d17a0cfce4ad6e8571c674.exe
-
Size
74KB
-
MD5
2d6a4155a7d17a0cfce4ad6e8571c674
-
SHA1
9992d09dfac2f5445a7d29d2ab1d68b42608b348
-
SHA256
749911c61e23b64b45f28d453a8b70275f824092d8dab39ccc1e93464d26b450
-
SHA512
c6033f05cc9ec432dfe22a00aaf5461708f95954326a78c52f0c4617d50811a3ff30e99c300df28dea4530f2c952c1048d6f2c5415010b1a860c8570f45991ee
-
SSDEEP
1536:cOUt8cxqnHXC56PMVCUiLsiIyLH1bT/yDkuQzcaLVclN:cOUOcxq3O6PMV9iFLH1bT6IuQLBY
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-