General
-
Target
d1f903b0f3cde4880408f44fcb30be784d1a1b979df7f249ad5c35e87f873790
-
Size
3.6MB
-
Sample
241013-yenv8svcmd
-
MD5
1816ea8c609c83ad29991af88da60a3f
-
SHA1
2e27cd519b6aafc0e8a439dc6268f7ed6661f0b3
-
SHA256
d1f903b0f3cde4880408f44fcb30be784d1a1b979df7f249ad5c35e87f873790
-
SHA512
1c9b48df258c457dafd6fab4631949de6f3aab3017afbb6179fe57089e5629052b0bcbd84d55a0364c23a5a141c4f1b1a25b94f33dfe0b728be3fcfccea0ab0d
-
SSDEEP
98304:10kyPmJLXKvcegBKUx0NNatL3Lin21B9HhJXQvrRUKujPmX:TTJ7BegBUatvZD9HhRoF6jP
Behavioral task
behavioral1
Sample
d1f903b0f3cde4880408f44fcb30be784d1a1b979df7f249ad5c35e87f873790.exe
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:1605
tkvbkymttagzul
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
d1f903b0f3cde4880408f44fcb30be784d1a1b979df7f249ad5c35e87f873790
-
Size
3.6MB
-
MD5
1816ea8c609c83ad29991af88da60a3f
-
SHA1
2e27cd519b6aafc0e8a439dc6268f7ed6661f0b3
-
SHA256
d1f903b0f3cde4880408f44fcb30be784d1a1b979df7f249ad5c35e87f873790
-
SHA512
1c9b48df258c457dafd6fab4631949de6f3aab3017afbb6179fe57089e5629052b0bcbd84d55a0364c23a5a141c4f1b1a25b94f33dfe0b728be3fcfccea0ab0d
-
SSDEEP
98304:10kyPmJLXKvcegBKUx0NNatL3Lin21B9HhJXQvrRUKujPmX:TTJ7BegBUatvZD9HhRoF6jP
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-