General

  • Target

    a774be49a50d0289a4d51679c1b75f736e8128c65451fcde9dc44812b9bf594e

  • Size

    75KB

  • Sample

    240818-xk4m7ssarp

  • MD5

    2435ef2414fcf616da97999a95ec4bd8

  • SHA1

    e2429b1a2b0aca9340a97d80d5ad7a311467f161

  • SHA256

    a774be49a50d0289a4d51679c1b75f736e8128c65451fcde9dc44812b9bf594e

  • SHA512

    99a606205c9ee2a1b2095df27afb53a3a392eba43e525bd6abc1fedeffb3e64eca1608c478b1fbfd1d75f7a65a1ec201edac8c9be4845fbb7dec348613898c25

  • SSDEEP

    1536:0ukULWEVCuPPMRkUKt2OlY6H1bf/i/f7kzkuLVclN:0XUyWHPMRkUv4jH1bfMf7k/BY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

94.156.66.48:4449

Mutex

Antivirus

Attributes
  • delay

    1

  • install

    true

  • install_file

    Antivirus.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://xcu.exgaming.click

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://xcu5.exgaming.click

Targets

    • Target

      a774be49a50d0289a4d51679c1b75f736e8128c65451fcde9dc44812b9bf594e

    • Size

      75KB

    • MD5

      2435ef2414fcf616da97999a95ec4bd8

    • SHA1

      e2429b1a2b0aca9340a97d80d5ad7a311467f161

    • SHA256

      a774be49a50d0289a4d51679c1b75f736e8128c65451fcde9dc44812b9bf594e

    • SHA512

      99a606205c9ee2a1b2095df27afb53a3a392eba43e525bd6abc1fedeffb3e64eca1608c478b1fbfd1d75f7a65a1ec201edac8c9be4845fbb7dec348613898c25

    • SSDEEP

      1536:0ukULWEVCuPPMRkUKt2OlY6H1bf/i/f7kzkuLVclN:0XUyWHPMRkUv4jH1bfMf7k/BY

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • VenomRAT

      Detects VenomRAT.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

MITRE ATT&CK Enterprise v15

Tasks