General
-
Target
BYTER.exe
-
Size
13.3MB
-
Sample
240817-j3kq6awaqh
-
MD5
9fd8d6a471d60fbf60d029504916ea50
-
SHA1
e1cb6de275494b2642a88a0b2136b1ec84551947
-
SHA256
ceb87fb8fc18a0699bac5b532cfdad64cfdf755efccb03b2571679460b465724
-
SHA512
c80968a9e7ecd6c31a4dcc5a27cd47260d0bc2601312b3b3a250487bea64e63595c062c9f48358fd477609a4bfcdd82bfca1da8689b3c247ce62d3fbfb409f7b
-
SSDEEP
393216:0tk1FrHQc/l+FvxWBqWwVrCCIIedFQMG9:0tkPHQG+FJAqWwVCCI/Du
Static task
static1
Behavioral task
behavioral1
Sample
BYTER.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
BYTER.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
10.0.2.15:9090
10.0.2.15:52033
147.185.221.19:9090
147.185.221.19:52033
yigdzohbebyxyvvzbc
-
delay
1
-
install
true
-
install_file
Steam.exe
-
install_folder
%AppData%
Targets
-
-
Target
BYTER.exe
-
Size
13.3MB
-
MD5
9fd8d6a471d60fbf60d029504916ea50
-
SHA1
e1cb6de275494b2642a88a0b2136b1ec84551947
-
SHA256
ceb87fb8fc18a0699bac5b532cfdad64cfdf755efccb03b2571679460b465724
-
SHA512
c80968a9e7ecd6c31a4dcc5a27cd47260d0bc2601312b3b3a250487bea64e63595c062c9f48358fd477609a4bfcdd82bfca1da8689b3c247ce62d3fbfb409f7b
-
SSDEEP
393216:0tk1FrHQc/l+FvxWBqWwVrCCIIedFQMG9:0tkPHQG+FJAqWwVCCI/Du
Score10/10-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-