General
-
Target
17dc9571dbd7e094dd65a862adfcde7328a3c3e45c9053ba99bff638e7918b4e
-
Size
74KB
-
Sample
240818-w5ts3a1bml
-
MD5
31548bc072b604c0617e5ebcf7fc60b4
-
SHA1
035e68c49525e477ca5e61f77e1f8fdd4955b722
-
SHA256
17dc9571dbd7e094dd65a862adfcde7328a3c3e45c9053ba99bff638e7918b4e
-
SHA512
9848a6406fa2b6ff3046dd147eb94583fb637a2598dc332905b2a98e171814d3d76554bcf54a909503577fab85ccccf29ae475f614edd3f30e0a62afe8696cb1
-
SSDEEP
1536:mUJQcxAz6/CTGPMVfe9VdQuDI6H1bf/gqcnSQzcaLVclN:mUWcxAW/4GPMVfe9VdQsH1bfQnSQLBY
Behavioral task
behavioral1
Sample
17dc9571dbd7e094dd65a862adfcde7328a3c3e45c9053ba99bff638e7918b4e.exe
Resource
win7-20240704-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
WindowsRuntimeBrokerService
-
delay
1
-
install
true
-
install_file
Microsoft\Windows\Themes\RuntimeBroker.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/xcd2XZ5Q
Targets
-
-
Target
17dc9571dbd7e094dd65a862adfcde7328a3c3e45c9053ba99bff638e7918b4e
-
Size
74KB
-
MD5
31548bc072b604c0617e5ebcf7fc60b4
-
SHA1
035e68c49525e477ca5e61f77e1f8fdd4955b722
-
SHA256
17dc9571dbd7e094dd65a862adfcde7328a3c3e45c9053ba99bff638e7918b4e
-
SHA512
9848a6406fa2b6ff3046dd147eb94583fb637a2598dc332905b2a98e171814d3d76554bcf54a909503577fab85ccccf29ae475f614edd3f30e0a62afe8696cb1
-
SSDEEP
1536:mUJQcxAz6/CTGPMVfe9VdQuDI6H1bf/gqcnSQzcaLVclN:mUWcxAW/4GPMVfe9VdQsH1bfQnSQLBY
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-