Resubmissions

01-11-2024 19:21

241101-x2x7rasncw 10

01-11-2024 19:17

241101-xznwaswjej 10

01-11-2024 02:08

241101-ckp5latpgs 10

General

  • Target

    VenomRAT.v6.0.3.+SOURCE.7z

  • Size

    73.7MB

  • Sample

    241101-x2x7rasncw

  • MD5

    29c6c293c6723135cbe7b5d0fc3a3d20

  • SHA1

    17219c8998c1afa1bd7061276958e9ed54cbb393

  • SHA256

    46c17ffefbfcaa044cbbcbb33d6219da84538c22a51e53bff647c87da33a0bd9

  • SHA512

    d6833432820b6eb2828ffd88a3028f3b3b014176db76330ce5c3af5eeb80aac1d9816d81dfdaa11a972e59ed144551d60c1cf4b0568e5cc7dedcb6df033c12e1

  • SSDEEP

    1572864:4VI5gzIBQ4OZRbwhtq81vZ8KCNsuYk+8327i8Nd5Sr5:KIeIa4Atotq87BCyuz+BOKe5

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

95.216.52.21:7575

Mutex

xdnqiaxygefjfoolgo

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

Mutex

lilmcgggegpnktrccy

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      VenomRAT.v6.0.3.+SOURCE.7z

    • Size

      73.7MB

    • MD5

      29c6c293c6723135cbe7b5d0fc3a3d20

    • SHA1

      17219c8998c1afa1bd7061276958e9ed54cbb393

    • SHA256

      46c17ffefbfcaa044cbbcbb33d6219da84538c22a51e53bff647c87da33a0bd9

    • SHA512

      d6833432820b6eb2828ffd88a3028f3b3b014176db76330ce5c3af5eeb80aac1d9816d81dfdaa11a972e59ed144551d60c1cf4b0568e5cc7dedcb6df033c12e1

    • SSDEEP

      1572864:4VI5gzIBQ4OZRbwhtq81vZ8KCNsuYk+8327i8Nd5Sr5:KIeIa4Atotq87BCyuz+BOKe5

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Modifies Windows Defender Real-time Protection settings

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Async RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks