General

  • Target

    d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe

  • Size

    136KB

  • Sample

    241116-wa8nqszlhv

  • MD5

    71166c04e60532bb84fc37b12cbc39c2

  • SHA1

    438f6bc46adc2f500516adfa83668ae0bf48abfd

  • SHA256

    d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d

  • SHA512

    bfbd3b5a909c4a89639c20ac63e3947e5c78f16b05adc8496bcda9ccb6642ac848256c9778c80f8150ecf8138c33ed5c4c1ba391fd20e83427fb4b09e9aa58bd

  • SSDEEP

    3072:seRxy2E/7oh9/Gzyx7XaI/7fI81Z34zikDMSb1BYLWQfv:BkO9/GKX17FZIukD9O3

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

qdjtygkpttzwe

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/w9ciyBd2

aes.plain

Targets

    • Target

      d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d.exe

    • Size

      136KB

    • MD5

      71166c04e60532bb84fc37b12cbc39c2

    • SHA1

      438f6bc46adc2f500516adfa83668ae0bf48abfd

    • SHA256

      d34a8a8a5661c308dff6fa997aa1151ee7ed46bfefee20b64e826292a272e42d

    • SHA512

      bfbd3b5a909c4a89639c20ac63e3947e5c78f16b05adc8496bcda9ccb6642ac848256c9778c80f8150ecf8138c33ed5c4c1ba391fd20e83427fb4b09e9aa58bd

    • SSDEEP

      3072:seRxy2E/7oh9/Gzyx7XaI/7fI81Z34zikDMSb1BYLWQfv:BkO9/GKX17FZIukD9O3

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Async RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks