General

  • Target

    c52fa3a0f171271b2b9a962c581b2183cdcf66622e35f9ec4530a26b13c6ba64

  • Size

    77KB

  • Sample

    240818-xpa7fsscqp

  • MD5

    d7fdc3235eba3280a7ee70a30b97193a

  • SHA1

    d52a9e290a46919c1cefb4b96c2055f81983e45f

  • SHA256

    c52fa3a0f171271b2b9a962c581b2183cdcf66622e35f9ec4530a26b13c6ba64

  • SHA512

    afff2be759992d029d47a198bcf08612d9ae6399d0d3da14c7ff694735bf22cface56092b8d4f1df30daf790798cffc5123a1669487309d313dcd0cdcf3a5202

  • SSDEEP

    1536:OUakcxw+/9CZSPMVae9VdQuDI6H1bf/r3EQzcCLVclN:OUTcxw+1uSPMVae9VdQsH1bfYQbBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

185.162.75.19:4449

Mutex

clnivizlzzwamiwcu

Attributes
  • delay

    1

  • install

    true

  • install_file

    VenomClient.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      c52fa3a0f171271b2b9a962c581b2183cdcf66622e35f9ec4530a26b13c6ba64

    • Size

      77KB

    • MD5

      d7fdc3235eba3280a7ee70a30b97193a

    • SHA1

      d52a9e290a46919c1cefb4b96c2055f81983e45f

    • SHA256

      c52fa3a0f171271b2b9a962c581b2183cdcf66622e35f9ec4530a26b13c6ba64

    • SHA512

      afff2be759992d029d47a198bcf08612d9ae6399d0d3da14c7ff694735bf22cface56092b8d4f1df30daf790798cffc5123a1669487309d313dcd0cdcf3a5202

    • SSDEEP

      1536:OUakcxw+/9CZSPMVae9VdQuDI6H1bf/r3EQzcCLVclN:OUTcxw+1uSPMVae9VdQsH1bfYQbBY

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • VenomRAT

      Detects VenomRAT.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks