General

  • Target

    d9cc8097cc5d74d11d9113492013d91daf4d1d1a03e71110c361701af4fd2f8d

  • Size

    7.0MB

  • Sample

    241116-g18n4avngq

  • MD5

    cb91eb2746a192f97491605bb0a5a111

  • SHA1

    0b3af664a400b75aa4c0f2aa39d8690c47cd5f6f

  • SHA256

    d9cc8097cc5d74d11d9113492013d91daf4d1d1a03e71110c361701af4fd2f8d

  • SHA512

    9a3daa6435e3bfd94aec4abb009302041f31c1e8191007024c08ba8b104c2702a4744e5f5aefcf24a3e48929bd0f8642f07f4d75d2fff8a215df39250206c120

  • SSDEEP

    196608:veVhMYpwfI9j2i4H1qSiXLGVi7DnStHuQJTMRRccxw:WVOIEiK1piXLGVEutHbJTeK

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

8.140.196.172:42606

Mutex

zkzeqemwohzo

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      d9cc8097cc5d74d11d9113492013d91daf4d1d1a03e71110c361701af4fd2f8d

    • Size

      7.0MB

    • MD5

      cb91eb2746a192f97491605bb0a5a111

    • SHA1

      0b3af664a400b75aa4c0f2aa39d8690c47cd5f6f

    • SHA256

      d9cc8097cc5d74d11d9113492013d91daf4d1d1a03e71110c361701af4fd2f8d

    • SHA512

      9a3daa6435e3bfd94aec4abb009302041f31c1e8191007024c08ba8b104c2702a4744e5f5aefcf24a3e48929bd0f8642f07f4d75d2fff8a215df39250206c120

    • SSDEEP

      196608:veVhMYpwfI9j2i4H1qSiXLGVi7DnStHuQJTMRRccxw:WVOIEiK1piXLGVEutHbJTeK

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks