General

  • Target

    a83d5e622b2e0b13048c7f67e06b029e95aba1344a16e5d0912eec5fb70a9a10N.exe

  • Size

    136KB

  • Sample

    241117-s6y8dstbmr

  • MD5

    ba8e1047d16828e515b4c8b24ea0a660

  • SHA1

    a72be9e504bffd192016f70a542fe96873b11c7f

  • SHA256

    a83d5e622b2e0b13048c7f67e06b029e95aba1344a16e5d0912eec5fb70a9a10

  • SHA512

    35f48bfd66d4575d061785f0d127f18dd0ee0e45fe0a572d48060833e1a36e533ee8b73a8066985399e2f1108bcdee95290b8391026f4d430e94f81ac6e385c5

  • SSDEEP

    3072:seRxy2E/7oh9/Gzyx7XaI/7fI81Z34zikDMSb1BYLWQf:BkO9/GKX17FZIukD9O

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

qdjtygkpttzwe

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/w9ciyBd2

aes.plain

Targets

    • Target

      a83d5e622b2e0b13048c7f67e06b029e95aba1344a16e5d0912eec5fb70a9a10N.exe

    • Size

      136KB

    • MD5

      ba8e1047d16828e515b4c8b24ea0a660

    • SHA1

      a72be9e504bffd192016f70a542fe96873b11c7f

    • SHA256

      a83d5e622b2e0b13048c7f67e06b029e95aba1344a16e5d0912eec5fb70a9a10

    • SHA512

      35f48bfd66d4575d061785f0d127f18dd0ee0e45fe0a572d48060833e1a36e533ee8b73a8066985399e2f1108bcdee95290b8391026f4d430e94f81ac6e385c5

    • SSDEEP

      3072:seRxy2E/7oh9/Gzyx7XaI/7fI81Z34zikDMSb1BYLWQf:BkO9/GKX17FZIukD9O

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Async RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks