General
-
Target
0e2d07b49674f051f891007d781db4ae0d468286ce41309305ccce3dabf1abda
-
Size
75KB
-
Sample
240818-w4zypa1bjr
-
MD5
4fbd2fe9137a020947bcf47e878ad423
-
SHA1
b4a1d9dad685f12de91a22ffaad45134c7bc9128
-
SHA256
0e2d07b49674f051f891007d781db4ae0d468286ce41309305ccce3dabf1abda
-
SHA512
dec1971e3a42404b864fdd408008ecd25ccdeb5556a82ba87e00beec24783fbec01c611eb85289dad9df73594789e7d9446ae97a29ba8897db16270fb8d20991
-
SSDEEP
1536:UGkU28PCCgMPMRk8Kt2OlY6H1bf/iG4CkzkKLVclN:U/UDamPMRk8v4jH1bfoCkDBY
Behavioral task
behavioral1
Sample
0e2d07b49674f051f891007d781db4ae0d468286ce41309305ccce3dabf1abda.exe
Resource
win7-20240704-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
51.254.53.24:4449
51.254.53.24:16388
88.175.86.67:4449
88.175.86.67:16388
CPS
-
delay
1
-
install
true
-
install_file
carte CPS.exe
-
install_folder
%AppData%
Extracted
http://xcu.exgaming.click
Extracted
http://xcu5.exgaming.click
Targets
-
-
Target
0e2d07b49674f051f891007d781db4ae0d468286ce41309305ccce3dabf1abda
-
Size
75KB
-
MD5
4fbd2fe9137a020947bcf47e878ad423
-
SHA1
b4a1d9dad685f12de91a22ffaad45134c7bc9128
-
SHA256
0e2d07b49674f051f891007d781db4ae0d468286ce41309305ccce3dabf1abda
-
SHA512
dec1971e3a42404b864fdd408008ecd25ccdeb5556a82ba87e00beec24783fbec01c611eb85289dad9df73594789e7d9446ae97a29ba8897db16270fb8d20991
-
SSDEEP
1536:UGkU28PCCgMPMRk8Kt2OlY6H1bf/iG4CkzkKLVclN:U/UDamPMRk8v4jH1bfoCkDBY
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-