General
-
Target
ReBomb2.exe
-
Size
8.8MB
-
Sample
241124-1rn3waxmdj
-
MD5
11f3d124b89d4c6a737f993442e15259
-
SHA1
290b45651633021d3afd4bdedf8f03c2c705cf11
-
SHA256
80d1631227d5b253b69f1004286c4562e765d54be593ac0b6ad0d34b35275f94
-
SHA512
43822db6a9dd226579c136e7049012714fb54ca4915fdf4b4ba92e2a72380b1b56de7a9a6cef79e9b62139e36244812955ca4bb2ff8991f03ef96f929d95b4f8
-
SSDEEP
196608:jnXFXAjanN0pJEFaSWADbBZpY8kqt0W9X41CoOw0bldnC9t:DFrypJEDpnpzkqt0kX41CtBdnC9t
Static task
static1
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
windows-services.linkpc.net:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
Extracted
arrowrat
VenomHVNC
windows-services.linkpc.net:4448
waDQmvKdS.exe
Targets
-
-
Target
ReBomb2.exe
-
Size
8.8MB
-
MD5
11f3d124b89d4c6a737f993442e15259
-
SHA1
290b45651633021d3afd4bdedf8f03c2c705cf11
-
SHA256
80d1631227d5b253b69f1004286c4562e765d54be593ac0b6ad0d34b35275f94
-
SHA512
43822db6a9dd226579c136e7049012714fb54ca4915fdf4b4ba92e2a72380b1b56de7a9a6cef79e9b62139e36244812955ca4bb2ff8991f03ef96f929d95b4f8
-
SSDEEP
196608:jnXFXAjanN0pJEFaSWADbBZpY8kqt0W9X41CoOw0bldnC9t:DFrypJEDpnpzkqt0kX41CtBdnC9t
-
Arrowrat family
-
Asyncrat family
-
Async RAT payload
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-