General

  • Target

    ad320647b7cedddf918daaff0fca18e4cc92493d82c21062cd0acff66ad1e0deN

  • Size

    74KB

  • Sample

    241004-3hv6yasdqp

  • MD5

    e5ebd0b94853ac7c6d8f2f1e755e6200

  • SHA1

    7723a709bcd5d593b8a26c64995189536e8f4f27

  • SHA256

    ad320647b7cedddf918daaff0fca18e4cc92493d82c21062cd0acff66ad1e0de

  • SHA512

    0ab193eed655acee210a0f9992d676508695aa76442e5b6bc9e68301cd9524f878d1832243af8a816311ba8922af284b80b395d0c32ea0825222bcc112c25c23

  • SSDEEP

    1536:NUxQcxI76jCsGPMVee9VdQuDI6H1bf/2DzIQzcCLVclN:NUOcxI7q3GPMVee9VdQsH1bf88QTBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

C2

147.185.221.21:64638

Mutex

AADWadsafsjbajiawd=-adfsr

Attributes
  • delay

    1

  • install

    true

  • install_file

    Windows Update.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      ad320647b7cedddf918daaff0fca18e4cc92493d82c21062cd0acff66ad1e0deN

    • Size

      74KB

    • MD5

      e5ebd0b94853ac7c6d8f2f1e755e6200

    • SHA1

      7723a709bcd5d593b8a26c64995189536e8f4f27

    • SHA256

      ad320647b7cedddf918daaff0fca18e4cc92493d82c21062cd0acff66ad1e0de

    • SHA512

      0ab193eed655acee210a0f9992d676508695aa76442e5b6bc9e68301cd9524f878d1832243af8a816311ba8922af284b80b395d0c32ea0825222bcc112c25c23

    • SSDEEP

      1536:NUxQcxI76jCsGPMVee9VdQuDI6H1bf/2DzIQzcCLVclN:NUOcxI7q3GPMVee9VdQsH1bf88QTBY

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • VenomRAT

      Detects VenomRAT.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks