General
-
Target
f396605e7a50772fd0242a38a77ed525cd51f1d226117893193b0d4a67d5a2c7
-
Size
74KB
-
Sample
240818-xs8l5asern
-
MD5
3375f15f1b089ac7a6208e668875b167
-
SHA1
dc24a6b9d1b2c38b65cd6bab2288def8cf5b098b
-
SHA256
f396605e7a50772fd0242a38a77ed525cd51f1d226117893193b0d4a67d5a2c7
-
SHA512
b61b9b53116e6c504f0e568421473720ca65d08f9a9d0e062eab6260bd1bf8a39df5c0ebe45c0663731ee23770a208e36506c30c2f107641223c366a1d55608f
-
SSDEEP
1536:UUqAcxOIWC72PMV+e9VdQuDIqH1bd/9+wGQzcOLVclN:UUTcxONo2PMV+e9VdQ4H1bdoQHBY
Behavioral task
behavioral1
Sample
f396605e7a50772fd0242a38a77ed525cd51f1d226117893193b0d4a67d5a2c7.exe
Resource
win7-20240704-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
80.253.246.53:2000
ghnogqnqsw
-
delay
1
-
install
true
-
install_file
SystemUpdate.exe
-
install_folder
%AppData%
Targets
-
-
Target
f396605e7a50772fd0242a38a77ed525cd51f1d226117893193b0d4a67d5a2c7
-
Size
74KB
-
MD5
3375f15f1b089ac7a6208e668875b167
-
SHA1
dc24a6b9d1b2c38b65cd6bab2288def8cf5b098b
-
SHA256
f396605e7a50772fd0242a38a77ed525cd51f1d226117893193b0d4a67d5a2c7
-
SHA512
b61b9b53116e6c504f0e568421473720ca65d08f9a9d0e062eab6260bd1bf8a39df5c0ebe45c0663731ee23770a208e36506c30c2f107641223c366a1d55608f
-
SSDEEP
1536:UUqAcxOIWC72PMV+e9VdQuDIqH1bd/9+wGQzcOLVclN:UUTcxONo2PMV+e9VdQ4H1bdoQHBY
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-