Overview
overview
10Static
static
10GMAIL/Gmail.exe
windows11-21h2-x64
3GMAIL/Leaf.xNet.js
windows11-21h2-x64
3Instagram VM.exe
windows11-21h2-x64
6Randome/La...p_.rar
windows11-21h2-x64
3LazyAIO/LazyAIO.exe
windows11-21h2-x64
7Randome/Minecraft.rar
windows11-21h2-x64
3Minecraft/...ft.exe
windows11-21h2-x64
4VenomRAT v...nt.exe
windows11-21h2-x64
10General
-
Target
Randome.zip
-
Size
104.5MB
-
Sample
240927-y7q63azgkh
-
MD5
9560ed37c84c3275864678494f17ca8e
-
SHA1
be13b5d932bcf07c2b40837d1601505b004520a1
-
SHA256
b4acfbc4174469c9aff54043442223afe559dab84954e4b51b64756fe2b045ac
-
SHA512
129a24922493bb080678e1397f81633299c4945e8fb04c9200e069e20b0faf5fb577d1d77785cdb043f4e3ad1bebff2dca381dfea334f04b4ca882b50294cdae
-
SSDEEP
1572864:AfEq6EoSgn9IUMwnuQexJEuTQ4Hj+XmJfBL9FZx13wDiYu4eH0IuvHcYrvzk/cfw:AMjIUMgAJrc4HtR1ciLefjob
Behavioral task
behavioral1
Sample
GMAIL/Gmail.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
GMAIL/Leaf.xNet.js
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Instagram VM.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Randome/LaxyAIO_p_.rar
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
LazyAIO/LazyAIO.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Randome/Minecraft.rar
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Minecraft/Minecraft.exe
Resource
win11-20240802-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
93.82.44.26:4040
nheplizwdi
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
GMAIL/Gmail.exe
-
Size
31KB
-
MD5
10de14e959542b63e94f5a37f6326777
-
SHA1
9815b38b9e848493c840b4a86526551898ec5ab8
-
SHA256
34222959f485e42bc4759e27db7cfb3403da888b451e4cad755da65a87a4de97
-
SHA512
4063e60de584e7996d31acb6ff5e45c44f9b5bcdae9aa160185e92e794394b3791d5270dda56c76afba2a1eea00fb6bcaee7c94b49b57e05d87a9268e8e428a2
-
SSDEEP
768:upwE8K8WcS8GMpUll3BuWKjxctA+FZJrMA/n70dVo+tKF:u3l3BMFczFvMA/nY/o+tKF
Score3/10 -
-
-
Target
GMAIL/Leaf.xNet.xml
-
Size
276KB
-
MD5
b033607c30c9e7a25ba3e478b0a00e18
-
SHA1
f5d51a5a92be9f5dc7b355ce08f6476d57017bb9
-
SHA256
52631a555c91918bf0922474667dc6bb3576f1eaece34480ae8addabcc7d0f08
-
SHA512
44f6641e785ed352fb0b68b82a745a58e59de03513314baaa2b1be3ae2162655747ffb9590ddff4a081df85a325b30670c1351e6f0b238e8eac5fba6e8808d12
-
SSDEEP
6144:qad+PiKgyxxE15ywFLOpXDKwEwXAwTeBufMJ3fMVd4PMvMP35M93P:qaoPiKgy+ywFLOt+X+AceB6w3fkd4Ps7
Score3/10 -
-
-
Target
Instagram VM.exe
-
Size
693KB
-
MD5
761810f1dd2bdccd7813fc9b04c51051
-
SHA1
00c986e516dc1806fa68db05f6a7d45033f377a5
-
SHA256
66d3941c4bfc73f9267a1c3d5af24bb882e36c458c53f0027aa2bf68e86653c9
-
SHA512
d86b92e4c8bed114dbb09e1893793ccb46c5e9d4a83c19bc0291f2f8061475ef021993aa7d4ab68f6cd39dea1b21bf7248f46ff3d734d412f41aadadf59e6cc2
-
SSDEEP
12288:OgAL5nw+Qtsu6QICtDUlWd3jJ/9YyUQg91YRMDJ:Ol5nWrIElx2y81h
Score6/10-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Randome/LaxyAIO_p_.rar
-
Size
4.7MB
-
MD5
ad5431cecf2486b59999c6772de0c73d
-
SHA1
3ac60290f110a251915618c01d30561d0725790a
-
SHA256
be756d531a946b77974179189a4dd7b0b4aebb3fd9f3f8f1d349dad62fcc0c3e
-
SHA512
053615541f511ae8514d5b922b345b36099d651eac21eb926958df0add3dd0ac212a00f2c96533c74ce0b1698f513c4de31be50a2bdd2d0804bd74ca42398e99
-
SSDEEP
98304:/1lgJaFItTN7QtmROzzRdHOSTMGaXf1MY/jwcvhWO00:tqJaFItT6tdHjTMDM+smWO00
Score3/10 -
-
-
Target
LazyAIO/LazyAIO.exe
-
Size
14.0MB
-
MD5
912c7062ea2bcd72cfca56bda87bec61
-
SHA1
c7422d0ba5e3e191815bc23232591441b15dc6e8
-
SHA256
3cf5521e8fca62a2b14808f240766cf4ddcda830786457d24f1641e7c6ce9344
-
SHA512
9073e89b6711b06a7f98ab8bab5497921a8d04cdf5d3a3d176cbdd33c3e5e5069d3b071e669a23043d0954ff59592dff9781ce3f5cf58cb92e031d6a6f83fd95
-
SSDEEP
49152:j/T9XzcMurcgwdDpDzIysQimHDFz+bDSPgm3QeFmWWE1CC3Yur2+5aPPtKm9taTc:X9mtwi+1oYQymWFCCSHo65fX
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
-
-
Target
Randome/Minecraft.rar
-
Size
163KB
-
MD5
28c389b9e318f7a6baabb38351d0bde4
-
SHA1
a2349aef9a482c07d464510e9806f3bf26ac1c27
-
SHA256
5317a6dcb2a2be7896b7b02e80a25522abc09d1a0a575ee5020f4cbc1b2078a7
-
SHA512
60640d88ab85bcda1e8424d7c9cfb76bf983b2e8d6ff7fa869b38e40dbb548bd9ad7a911e1bc8390087328461296ddbac54fd94321f02efd8a91228ff6212c08
-
SSDEEP
3072:G1D2KiaoPTEeni0lLJiqycaRRSh8a2+9Un9KX3fGiYcBC9Gieel939:49idPTO0uq3couxwUnY3fWceGDenN
Score3/10 -
-
-
Target
Minecraft/Minecraft.exe
-
Size
275KB
-
MD5
9affb7fa676cf886e26db62cb2551049
-
SHA1
5a9c57cdde1e326176c1c704b0dd99a204206708
-
SHA256
3e9d47b28ef50dc9e05f3960b08ab706eac8e335378f56c8cb10f8e50b5ea496
-
SHA512
bb5cc56f1f0ad058dfa47505c355536803a2124fc2905def17155c9e67bd66132413f142df8ef4119a08a5cb63f988e4e3f0f05a6336e139f994d6e46190f59b
-
SSDEEP
6144:O5/1evXsbwi+ifQFKgkFNWhWleeKkfv1FX9:OB1evYGiAtIWhWlGkfTX
Score4/10 -
-
-
Target
VenomRAT v6.0.3_p_/Client.exe
-
Size
73KB
-
MD5
5d6802a39c1bea84e1bd3e6ba23b7bbb
-
SHA1
17b6040dcd0dc6c0cf794b6d95ed4da0f07ef0b9
-
SHA256
d1fd56cb9943f5b185c8ee52a34f7ea4d34c5091f77ea18138f1d13a8951dd5e
-
SHA512
55df1ab721022d363b6d454ab496b7cc542702edda0525037cc8f0c33a1d93bc50ed62be8d4b95ba1248d7fee5b806d599ddce5e3ff6a9d4464e3047a0ee799d
-
SSDEEP
1536:LUUPcxVteCW7PMVee9VdQkhDIyH1bf/mc6QzcajVclNw:LUmcxV4x7PMVee9VdQgH1bfd6QLJY+
-