Resubmissions

27-09-2024 20:25

240927-y7q63azgkh 10

27-09-2024 20:17

240927-y2m78axelm 10

General

  • Target

    Randome.zip

  • Size

    104.5MB

  • Sample

    240927-y7q63azgkh

  • MD5

    9560ed37c84c3275864678494f17ca8e

  • SHA1

    be13b5d932bcf07c2b40837d1601505b004520a1

  • SHA256

    b4acfbc4174469c9aff54043442223afe559dab84954e4b51b64756fe2b045ac

  • SHA512

    129a24922493bb080678e1397f81633299c4945e8fb04c9200e069e20b0faf5fb577d1d77785cdb043f4e3ad1bebff2dca381dfea334f04b4ca882b50294cdae

  • SSDEEP

    1572864:AfEq6EoSgn9IUMwnuQexJEuTQ4Hj+XmJfBL9FZx13wDiYu4eH0IuvHcYrvzk/cfw:AMjIUMgAJrc4HtR1ciLefjob

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

93.82.44.26:4040

Mutex

nheplizwdi

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      GMAIL/Gmail.exe

    • Size

      31KB

    • MD5

      10de14e959542b63e94f5a37f6326777

    • SHA1

      9815b38b9e848493c840b4a86526551898ec5ab8

    • SHA256

      34222959f485e42bc4759e27db7cfb3403da888b451e4cad755da65a87a4de97

    • SHA512

      4063e60de584e7996d31acb6ff5e45c44f9b5bcdae9aa160185e92e794394b3791d5270dda56c76afba2a1eea00fb6bcaee7c94b49b57e05d87a9268e8e428a2

    • SSDEEP

      768:upwE8K8WcS8GMpUll3BuWKjxctA+FZJrMA/n70dVo+tKF:u3l3BMFczFvMA/nY/o+tKF

    Score
    3/10
    • Target

      GMAIL/Leaf.xNet.xml

    • Size

      276KB

    • MD5

      b033607c30c9e7a25ba3e478b0a00e18

    • SHA1

      f5d51a5a92be9f5dc7b355ce08f6476d57017bb9

    • SHA256

      52631a555c91918bf0922474667dc6bb3576f1eaece34480ae8addabcc7d0f08

    • SHA512

      44f6641e785ed352fb0b68b82a745a58e59de03513314baaa2b1be3ae2162655747ffb9590ddff4a081df85a325b30670c1351e6f0b238e8eac5fba6e8808d12

    • SSDEEP

      6144:qad+PiKgyxxE15ywFLOpXDKwEwXAwTeBufMJ3fMVd4PMvMP35M93P:qaoPiKgy+ywFLOt+X+AceB6w3fkd4Ps7

    Score
    3/10
    • Target

      Instagram VM.exe

    • Size

      693KB

    • MD5

      761810f1dd2bdccd7813fc9b04c51051

    • SHA1

      00c986e516dc1806fa68db05f6a7d45033f377a5

    • SHA256

      66d3941c4bfc73f9267a1c3d5af24bb882e36c458c53f0027aa2bf68e86653c9

    • SHA512

      d86b92e4c8bed114dbb09e1893793ccb46c5e9d4a83c19bc0291f2f8061475ef021993aa7d4ab68f6cd39dea1b21bf7248f46ff3d734d412f41aadadf59e6cc2

    • SSDEEP

      12288:OgAL5nw+Qtsu6QICtDUlWd3jJ/9YyUQg91YRMDJ:Ol5nWrIElx2y81h

    Score
    6/10
    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      Randome/LaxyAIO_p_.rar

    • Size

      4.7MB

    • MD5

      ad5431cecf2486b59999c6772de0c73d

    • SHA1

      3ac60290f110a251915618c01d30561d0725790a

    • SHA256

      be756d531a946b77974179189a4dd7b0b4aebb3fd9f3f8f1d349dad62fcc0c3e

    • SHA512

      053615541f511ae8514d5b922b345b36099d651eac21eb926958df0add3dd0ac212a00f2c96533c74ce0b1698f513c4de31be50a2bdd2d0804bd74ca42398e99

    • SSDEEP

      98304:/1lgJaFItTN7QtmROzzRdHOSTMGaXf1MY/jwcvhWO00:tqJaFItT6tdHjTMDM+smWO00

    Score
    3/10
    • Target

      LazyAIO/LazyAIO.exe

    • Size

      14.0MB

    • MD5

      912c7062ea2bcd72cfca56bda87bec61

    • SHA1

      c7422d0ba5e3e191815bc23232591441b15dc6e8

    • SHA256

      3cf5521e8fca62a2b14808f240766cf4ddcda830786457d24f1641e7c6ce9344

    • SHA512

      9073e89b6711b06a7f98ab8bab5497921a8d04cdf5d3a3d176cbdd33c3e5e5069d3b071e669a23043d0954ff59592dff9781ce3f5cf58cb92e031d6a6f83fd95

    • SSDEEP

      49152:j/T9XzcMurcgwdDpDzIysQimHDFz+bDSPgm3QeFmWWE1CC3Yur2+5aPPtKm9taTc:X9mtwi+1oYQymWFCCSHo65fX

    Score
    7/10
    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Target

      Randome/Minecraft.rar

    • Size

      163KB

    • MD5

      28c389b9e318f7a6baabb38351d0bde4

    • SHA1

      a2349aef9a482c07d464510e9806f3bf26ac1c27

    • SHA256

      5317a6dcb2a2be7896b7b02e80a25522abc09d1a0a575ee5020f4cbc1b2078a7

    • SHA512

      60640d88ab85bcda1e8424d7c9cfb76bf983b2e8d6ff7fa869b38e40dbb548bd9ad7a911e1bc8390087328461296ddbac54fd94321f02efd8a91228ff6212c08

    • SSDEEP

      3072:G1D2KiaoPTEeni0lLJiqycaRRSh8a2+9Un9KX3fGiYcBC9Gieel939:49idPTO0uq3couxwUnY3fWceGDenN

    Score
    3/10
    • Target

      Minecraft/Minecraft.exe

    • Size

      275KB

    • MD5

      9affb7fa676cf886e26db62cb2551049

    • SHA1

      5a9c57cdde1e326176c1c704b0dd99a204206708

    • SHA256

      3e9d47b28ef50dc9e05f3960b08ab706eac8e335378f56c8cb10f8e50b5ea496

    • SHA512

      bb5cc56f1f0ad058dfa47505c355536803a2124fc2905def17155c9e67bd66132413f142df8ef4119a08a5cb63f988e4e3f0f05a6336e139f994d6e46190f59b

    • SSDEEP

      6144:O5/1evXsbwi+ifQFKgkFNWhWleeKkfv1FX9:OB1evYGiAtIWhWlGkfTX

    Score
    4/10
    • Target

      VenomRAT v6.0.3_p_/Client.exe

    • Size

      73KB

    • MD5

      5d6802a39c1bea84e1bd3e6ba23b7bbb

    • SHA1

      17b6040dcd0dc6c0cf794b6d95ed4da0f07ef0b9

    • SHA256

      d1fd56cb9943f5b185c8ee52a34f7ea4d34c5091f77ea18138f1d13a8951dd5e

    • SHA512

      55df1ab721022d363b6d454ab496b7cc542702edda0525037cc8f0c33a1d93bc50ed62be8d4b95ba1248d7fee5b806d599ddce5e3ff6a9d4464e3047a0ee799d

    • SSDEEP

      1536:LUUPcxVteCW7PMVee9VdQkhDIyH1bf/mc6QzcajVclNw:LUmcxV4x7PMVee9VdQgH1bfd6QLJY+

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

MITRE ATT&CK Enterprise v15

Tasks