General

  • Target

    0e05714577948291d4d194ea8ddf6f8cc12dcdd31f01ba2195c0c4afb952cef6

  • Size

    73KB

  • Sample

    240818-w4wk9sxdrc

  • MD5

    4e6a72392f01ffb3bae293a6c4b955d1

  • SHA1

    ab6910a9f4482e8409e35be2953cd8b26385927c

  • SHA256

    0e05714577948291d4d194ea8ddf6f8cc12dcdd31f01ba2195c0c4afb952cef6

  • SHA512

    24c5894443c641876c4969ab1e56e7833f09f0984e296a9a5dcc6f26138d9d22daf90f9c6fcd3f7114f1754656d42d1560965047b3353c40ac21f3d016a79a5c

  • SSDEEP

    1536:IU9ccx4y3lCl6PMVy1aievkWIKH1bI/91LgsQzcX3VclN:IU+cx4yVy6PMVgazbH1bIVxgsQilY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

xpjcrciguzejg

Attributes
  • delay

    1

  • install

    true

  • install_file

    WIN64.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/WPTghhr7

aes.plain

Targets

    • Target

      0e05714577948291d4d194ea8ddf6f8cc12dcdd31f01ba2195c0c4afb952cef6

    • Size

      73KB

    • MD5

      4e6a72392f01ffb3bae293a6c4b955d1

    • SHA1

      ab6910a9f4482e8409e35be2953cd8b26385927c

    • SHA256

      0e05714577948291d4d194ea8ddf6f8cc12dcdd31f01ba2195c0c4afb952cef6

    • SHA512

      24c5894443c641876c4969ab1e56e7833f09f0984e296a9a5dcc6f26138d9d22daf90f9c6fcd3f7114f1754656d42d1560965047b3353c40ac21f3d016a79a5c

    • SSDEEP

      1536:IU9ccx4y3lCl6PMVy1aievkWIKH1bI/91LgsQzcX3VclN:IU+cx4yVy6PMVgazbH1bIVxgsQilY

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • VenomRAT

      Detects VenomRAT.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks