General
-
Target
f1cf79e0ebbb693d10ca8b96d6c6aae0176c3a3417512bacaf0016207e60492d
-
Size
82KB
-
Sample
240818-xsyf6ayhnc
-
MD5
401cdb3441eaa85c7d5d85b8cfe0fe54
-
SHA1
6bbb659c5c2b30c24313efa7a3775b78cbf385c5
-
SHA256
f1cf79e0ebbb693d10ca8b96d6c6aae0176c3a3417512bacaf0016207e60492d
-
SHA512
fb70afc7e5a382b3970cf92feaa12c4cfeba7a7dbca0d0f8736b5a38c0e4c42204cf4975081eab940524332fd3067bc4d5da053b55e71f983e01bc20454822bf
-
SSDEEP
1536:x6UzwcxbUTCrmPMVAsP1K4I3H1bL/2sQzcH33LjVclN:wU0cxbgwmPMVA8wBH1bLesQK33LJY
Behavioral task
behavioral1
Sample
f1cf79e0ebbb693d10ca8b96d6c6aae0176c3a3417512bacaf0016207e60492d.exe
Resource
win7-20240705-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:9001
91.92.254.89:4449
91.92.254.89:9001
fefewfewfewf
-
delay
1
-
install
true
-
install_file
Realltek Audio Service 86x.exe
-
install_folder
%AppData%
Targets
-
-
Target
f1cf79e0ebbb693d10ca8b96d6c6aae0176c3a3417512bacaf0016207e60492d
-
Size
82KB
-
MD5
401cdb3441eaa85c7d5d85b8cfe0fe54
-
SHA1
6bbb659c5c2b30c24313efa7a3775b78cbf385c5
-
SHA256
f1cf79e0ebbb693d10ca8b96d6c6aae0176c3a3417512bacaf0016207e60492d
-
SHA512
fb70afc7e5a382b3970cf92feaa12c4cfeba7a7dbca0d0f8736b5a38c0e4c42204cf4975081eab940524332fd3067bc4d5da053b55e71f983e01bc20454822bf
-
SSDEEP
1536:x6UzwcxbUTCrmPMVAsP1K4I3H1bL/2sQzcH33LjVclN:wU0cxbgwmPMVA8wBH1bLesQK33LJY
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-