General
-
Target
REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe
-
Size
798KB
-
Sample
241007-j4exasygle
-
MD5
e34eb26af335bd435c40f82b3f8b48d0
-
SHA1
e4b7b90c3cdb4e3db62544d0117454def485964c
-
SHA256
92f2a11dbb3411bb3d30846bd6eec0b6411d5e03bf579c7f9d81c0fc649f1471
-
SHA512
922bd73e1797ece2979849a17a3bb788dc8316cab6fdf9f354fc6059e517c8a62d0d93c365c16e9fc8fef456f212213f7861cd3ed13c08a51cbcf63c816f58fd
-
SSDEEP
12288:mLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QVc42F+DdfM:EfmMv6Ckr7Mny5QVF0EdE
Static task
static1
Behavioral task
behavioral1
Sample
REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
LOGS
72.11.142.133:4449
orkxnmmqoswplswmucl
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe
-
Size
798KB
-
MD5
e34eb26af335bd435c40f82b3f8b48d0
-
SHA1
e4b7b90c3cdb4e3db62544d0117454def485964c
-
SHA256
92f2a11dbb3411bb3d30846bd6eec0b6411d5e03bf579c7f9d81c0fc649f1471
-
SHA512
922bd73e1797ece2979849a17a3bb788dc8316cab6fdf9f354fc6059e517c8a62d0d93c365c16e9fc8fef456f212213f7861cd3ed13c08a51cbcf63c816f58fd
-
SSDEEP
12288:mLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QVc42F+DdfM:EfmMv6Ckr7Mny5QVF0EdE
-
StormKitty payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-