General
-
Target
7d208f0c11c7f9d7575995e0236fb73311b5a8e06d04a09c0ea21a0875aaff07
-
Size
821KB
-
Sample
240818-xkd3jssapp
-
MD5
a2107f92b7db13bce21cc05a18711cdf
-
SHA1
57004395e6f72e46ddb9718db032562535f14cfa
-
SHA256
7d208f0c11c7f9d7575995e0236fb73311b5a8e06d04a09c0ea21a0875aaff07
-
SHA512
f6d94161a3ea238ec335ce5992d15a05286e3e1d0a3fe40cf15a189c14e1c7a47bbc336c7d30baaa6234a513dcf73792048bd9b773de7666a6f7ce247568ccb2
-
SSDEEP
12288:dMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9JhBBxdsP2g:dnsJ39LyjbJkQFMhmC+6GD9X5dsu
Static task
static1
Behavioral task
behavioral1
Sample
7d208f0c11c7f9d7575995e0236fb73311b5a8e06d04a09c0ea21a0875aaff07.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7d208f0c11c7f9d7575995e0236fb73311b5a8e06d04a09c0ea21a0875aaff07.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
lol.exe
-
delay
1
-
install
true
-
install_file
lol.exe
-
install_folder
%AppData%
Targets
-
-
Target
7d208f0c11c7f9d7575995e0236fb73311b5a8e06d04a09c0ea21a0875aaff07
-
Size
821KB
-
MD5
a2107f92b7db13bce21cc05a18711cdf
-
SHA1
57004395e6f72e46ddb9718db032562535f14cfa
-
SHA256
7d208f0c11c7f9d7575995e0236fb73311b5a8e06d04a09c0ea21a0875aaff07
-
SHA512
f6d94161a3ea238ec335ce5992d15a05286e3e1d0a3fe40cf15a189c14e1c7a47bbc336c7d30baaa6234a513dcf73792048bd9b773de7666a6f7ce247568ccb2
-
SSDEEP
12288:dMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9JhBBxdsP2g:dnsJ39LyjbJkQFMhmC+6GD9X5dsu
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-