General

  • Target

    45d177fa58f5866863009793a9266d1778a99a4162a40dd9f7579af8de2f691eN.exe

  • Size

    7KB

  • Sample

    241129-qv24ssxrfz

  • MD5

    efb300728cc6abad6005e98417031110

  • SHA1

    0f7143fdb0ea3d9a52ed2cb738d7abcbf5790f2c

  • SHA256

    45d177fa58f5866863009793a9266d1778a99a4162a40dd9f7579af8de2f691e

  • SHA512

    02f61ac6b5e583993ae239554b5cdecbb6ea2d75abc19f7c8fe13bcb7821113ca72565ed4da4549b6148f7bc4a2493e209c7b318a6a669aa79b21d71cab52dba

  • SSDEEP

    96:+t1b9mNmHx9+ia+H7493kOmcG5nOR7nnh2V2pprl0bzNt:+9m+xTvbxOmXO9n8V2ppJ09

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:2231

Mutex

ialdhmkvqyisemxnzmc

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      45d177fa58f5866863009793a9266d1778a99a4162a40dd9f7579af8de2f691eN.exe

    • Size

      7KB

    • MD5

      efb300728cc6abad6005e98417031110

    • SHA1

      0f7143fdb0ea3d9a52ed2cb738d7abcbf5790f2c

    • SHA256

      45d177fa58f5866863009793a9266d1778a99a4162a40dd9f7579af8de2f691e

    • SHA512

      02f61ac6b5e583993ae239554b5cdecbb6ea2d75abc19f7c8fe13bcb7821113ca72565ed4da4549b6148f7bc4a2493e209c7b318a6a669aa79b21d71cab52dba

    • SSDEEP

      96:+t1b9mNmHx9+ia+H7493kOmcG5nOR7nnh2V2pprl0bzNt:+9m+xTvbxOmXO9n8V2ppJ09

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Async RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks