General
-
Target
MT 103 PAYMENT SLIP.pdf.xz
-
Size
417KB
-
Sample
241011-pb2s9a1eqe
-
MD5
092f641c6aedd53a946749b17fc9a600
-
SHA1
405e02fb1aec9200f72743f09833364110e3887f
-
SHA256
b1444aaa649bea7bfad1285cadf4286d8cc04b3e595644d3e3b43faf6bb83e8e
-
SHA512
d5dbef3fd8378e12d981b6f391290b25107fe76abb28641ea095d8d48d96fc406490fc9e2f584bf0fdda0fa16168cc1936cfa545bfea22177efaaf80cf629750
-
SSDEEP
12288:W6bNIcG6IgjIyz2F4k9Yt6XCh0+PAW73s:WqIcG6/22k6t6XY0+PAic
Static task
static1
Behavioral task
behavioral1
Sample
MT 103 PAYMENT SLIP.pdf.exe
Resource
win7-20240708-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.106.92.86:4040
xcjujxywyntbavbe
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
MT 103 PAYMENT SLIP.pdf.exe
-
Size
469KB
-
MD5
3c69297a420b00c660113d44eb039254
-
SHA1
dc8212328e6dd88e713efb161ecaa3fe25d1eb0f
-
SHA256
142873db547e46701d0630bf254b6e4d7570a37e62194e89264b53410682d9a8
-
SHA512
70c3e84356bfc0798cb35b42907a64428d08b5816da7b30c7fe365f1c63f6312c68569b3b58e19f90539cc1bdb9a553346c92705ab0363c321b2ae16f3077e63
-
SSDEEP
12288:9JRUxMAcD2Im3x3I1luJwZrFhwJbAWqpI0:9JRUxjcD2Igh2lj20I0
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-