General
-
Target
ngrok.exe
-
Size
74KB
-
Sample
240917-n1dx2s1eme
-
MD5
7f79bdf9fe741fe446c056005a52fd8a
-
SHA1
dc7f0987c8e34303555682f3827537c70a0963e0
-
SHA256
9b5b73e916f04101f6bb33a5f1064e54bbaa04c1cf8efe9a40b7bf5deb18da6e
-
SHA512
dbcc16a8bc70e22f7073e7bd10b137eb7eb4430bbec6687c45d8e8cf203d35e23d8c554d9ef9f5e59613320b4fe5a312b37cb98a7a3686a18a7a93ff053888e3
-
SSDEEP
1536:QRU98cxpeaC/zPMV9fxraL2UIeH1bzKNm0Qzc7qVclN:mU+cxp7AzPMVz1kH1bz6Qu4Y
Behavioral task
behavioral1
Sample
ngrok.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Driver
13.229.3.203:19322
locsuccac
-
delay
1
-
install
true
-
install_file
ngrok.exe
-
install_folder
%AppData%
Targets
-
-
Target
ngrok.exe
-
Size
74KB
-
MD5
7f79bdf9fe741fe446c056005a52fd8a
-
SHA1
dc7f0987c8e34303555682f3827537c70a0963e0
-
SHA256
9b5b73e916f04101f6bb33a5f1064e54bbaa04c1cf8efe9a40b7bf5deb18da6e
-
SHA512
dbcc16a8bc70e22f7073e7bd10b137eb7eb4430bbec6687c45d8e8cf203d35e23d8c554d9ef9f5e59613320b4fe5a312b37cb98a7a3686a18a7a93ff053888e3
-
SSDEEP
1536:QRU98cxpeaC/zPMV9fxraL2UIeH1bzKNm0Qzc7qVclN:mU+cxp7AzPMVz1kH1bz6Qu4Y
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-