General
-
Target
corn.bat
-
Size
44KB
-
Sample
240930-t7bddsvfmp
-
MD5
e7a2eb0f8ad72bceec84b48c85cebbef
-
SHA1
789f12e6755ba3e5995169f1ad575185360f4387
-
SHA256
23474c7aca0d40d8920ba6f5b0ad5646f8d04075976ab3a53837dbb19638766f
-
SHA512
aa66289e3b41c5dc7c9b9a03eb96a2dbd6a33a408af0136afeaec41759a4da782031098954091d76d39bbd67b574a0c590fdb774258d30abc4eb07ce337cd1b4
-
SSDEEP
192:ckKne+fzSOWATUVF+qP7Hg1OA93vOOefDU4x4qL3JEgA9tS/Le2MGmHUQjw:cku1WATOF+qP7g1j93vp34xp1AGP20Qw
Static task
static1
Behavioral task
behavioral1
Sample
corn.bat
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Default
101.99.92.203:3232
91.92.247.210:3232
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
91.92.247.210:4449
sarcofamdkdtq
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.0
101.99.92.203:7000
j5QcRri4Mh9CWUxn
-
install_file
USB.exe
Targets
-
-
Target
corn.bat
-
Size
44KB
-
MD5
e7a2eb0f8ad72bceec84b48c85cebbef
-
SHA1
789f12e6755ba3e5995169f1ad575185360f4387
-
SHA256
23474c7aca0d40d8920ba6f5b0ad5646f8d04075976ab3a53837dbb19638766f
-
SHA512
aa66289e3b41c5dc7c9b9a03eb96a2dbd6a33a408af0136afeaec41759a4da782031098954091d76d39bbd67b574a0c590fdb774258d30abc4eb07ce337cd1b4
-
SSDEEP
192:ckKne+fzSOWATUVF+qP7Hg1OA93vOOefDU4x4qL3JEgA9tS/Le2MGmHUQjw:cku1WATOF+qP7g1j93vp34xp1AGP20Qw
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-