General

  • Target

    7b1e1f3473b95af2a11df5693cb39b09a20800fd0daf066698cd327ed946db8b

  • Size

    47KB

  • Sample

    240809-n72yfsthkg

  • MD5

    20ad0fc179d4fff062f95233e6ece58c

  • SHA1

    b31fa403762d427ce5e418a71ab84cef5f0562b5

  • SHA256

    7b1e1f3473b95af2a11df5693cb39b09a20800fd0daf066698cd327ed946db8b

  • SHA512

    a1cf89ff0731fabb7f37ac1f5cb38ba566818c5a5a0ca1b9b3e0ee14cc9944d4084501230c799fec8524f712331d650a3ab87a6390ba533b15dc431706a17ea5

  • SSDEEP

    768:ONEHRNPjlzQz4ZsDvhPyRgQSMUBc1JaPGmji8vNlXuHsjwWCyZSbjKPu0y:wcNPxzQz4KNKM2mGOvNlNjwWZobR0y

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.2

Botnet

READYGO

C2

154.216.18.40:4449

154.216.18.40:6184

127.0.0.1:4449

127.0.0.1:6184

Mutex

jbrtziyfzmhjgtm

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      New-Order#2819_381918_391733_3793_399173_509463_57165_509725.cmd

    • Size

      67KB

    • MD5

      25927e296d192c57b87be2b7c08b9217

    • SHA1

      a87d3ee507f615fbdd785beab75834de6ca8278a

    • SHA256

      ac9a63cffda7c69820207e8f51ed0a0d24f77d5f81600ccd56406790ca6f5c83

    • SHA512

      4c3606a2868f2ea0ddbc4a450614ccbd3f6a8bd649e6a797e8dbcab2e679bdbf2024f6722012431f9687109670a98e9b2e7d878e30fa0372a3531bf2ea3bbd97

    • SSDEEP

      1536:tXUTAKUXpetG7GvuGSERPZSnw22B1Tkn0v:tETvUXpI/GuH2BM

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks