General
-
Target
e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9
-
Size
821KB
-
Sample
240818-xrvc4sselr
-
MD5
0b69301f9ab8060c4608e75f33ba34fc
-
SHA1
9f4ca0e8025025c21fe8b0cf438c00b1981f11b3
-
SHA256
e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9
-
SHA512
8bfdada6e8b82f6566ac5776520fc10b006c02a24ae59d9550b360db8744495f8ff1f96c94395ccdeb95a1734b52c9d9ce616b45148d9f3cf0196c12de598a99
-
SSDEEP
12288:dMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9JhBBxdsP2g:dnsJ39LyjbJkQFMhmC+6GD9X5dsu
Behavioral task
behavioral1
Sample
e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
lol.exe
-
delay
1
-
install
true
-
install_file
lol.exe
-
install_folder
%AppData%
Targets
-
-
Target
e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9
-
Size
821KB
-
MD5
0b69301f9ab8060c4608e75f33ba34fc
-
SHA1
9f4ca0e8025025c21fe8b0cf438c00b1981f11b3
-
SHA256
e2fc16855f5a5088f9d9994d0b8852a4a57bf8be68086fb819443e684992d5c9
-
SHA512
8bfdada6e8b82f6566ac5776520fc10b006c02a24ae59d9550b360db8744495f8ff1f96c94395ccdeb95a1734b52c9d9ce616b45148d9f3cf0196c12de598a99
-
SSDEEP
12288:dMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9JhBBxdsP2g:dnsJ39LyjbJkQFMhmC+6GD9X5dsu
Score10/10-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-