General
-
Target
e4ff7372f55485d5d9dcf1849985eb7e79ccc1945b71c7293dc0b2b5a2034606
-
Size
157KB
-
Sample
240807-bednyawdpm
-
MD5
50814f8fc570268a7ce22e6b903ef552
-
SHA1
1d0f7a10da8d3a34b6a9536b05a738bcefcc8316
-
SHA256
e4ff7372f55485d5d9dcf1849985eb7e79ccc1945b71c7293dc0b2b5a2034606
-
SHA512
aca2a18a94d9d9d8ec4d02266033473dff149b6331c8a4f1b282e6941c2a65669870ac3795c159172a6ad8b944622122fedfcd355b758a04d053223391819601
-
SSDEEP
3072:VVoNnTW/vQgEAmjc+O3lBsSTzsSTxYKJy1v:VmNT6vQgEAmg+QlqST4STxYKJcv
Static task
static1
Behavioral task
behavioral1
Sample
e4ff7372f55485d5d9dcf1849985eb7e79ccc1945b71c7293dc0b2b5a2034606.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
34.45.30.242:443
34.45.30.242:80
34.66.204.146:443
34.66.204.146:80
uyvnhoyeedhzwfofge
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
e4ff7372f55485d5d9dcf1849985eb7e79ccc1945b71c7293dc0b2b5a2034606
-
Size
157KB
-
MD5
50814f8fc570268a7ce22e6b903ef552
-
SHA1
1d0f7a10da8d3a34b6a9536b05a738bcefcc8316
-
SHA256
e4ff7372f55485d5d9dcf1849985eb7e79ccc1945b71c7293dc0b2b5a2034606
-
SHA512
aca2a18a94d9d9d8ec4d02266033473dff149b6331c8a4f1b282e6941c2a65669870ac3795c159172a6ad8b944622122fedfcd355b758a04d053223391819601
-
SSDEEP
3072:VVoNnTW/vQgEAmjc+O3lBsSTzsSTxYKJy1v:VmNT6vQgEAmg+QlqST4STxYKJcv
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-