General

  • Target

    0692762b3a078c6571c03619c47d0d99d1a8bd5140b020599030dee87ff5ddebN

  • Size

    1.0MB

  • Sample

    241026-hq51wsyngq

  • MD5

    5e36f165ec29ff376a24bcb5b31fcb20

  • SHA1

    f2ebb0e38ff62d9d67c87a7f1ba174de857efd7e

  • SHA256

    0692762b3a078c6571c03619c47d0d99d1a8bd5140b020599030dee87ff5ddeb

  • SHA512

    0494c0029bd7763bf2a584cca47e8c860673843a3586b2d6fb1ff93ebfd562f7ae53b8aebf217554655956d081080a38eb6cba94bfbe127dffeee3dcc50e0d60

  • SSDEEP

    24576:b062cSEk8zNlL5nplsZqxTbJq5LWByCsctdcyoQUGd8Lh+Jo:A6PadqxZKLgyEtdch7d+Jo

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

91.107.210.50:4449

Mutex

32234435ertysdfghhg54

Attributes
  • delay

    1

  • install

    true

  • install_file

    admin.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      0692762b3a078c6571c03619c47d0d99d1a8bd5140b020599030dee87ff5ddebN

    • Size

      1.0MB

    • MD5

      5e36f165ec29ff376a24bcb5b31fcb20

    • SHA1

      f2ebb0e38ff62d9d67c87a7f1ba174de857efd7e

    • SHA256

      0692762b3a078c6571c03619c47d0d99d1a8bd5140b020599030dee87ff5ddeb

    • SHA512

      0494c0029bd7763bf2a584cca47e8c860673843a3586b2d6fb1ff93ebfd562f7ae53b8aebf217554655956d081080a38eb6cba94bfbe127dffeee3dcc50e0d60

    • SSDEEP

      24576:b062cSEk8zNlL5nplsZqxTbJq5LWByCsctdcyoQUGd8Lh+Jo:A6PadqxZKLgyEtdch7d+Jo

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks