General
-
Target
Client.exe
-
Size
63KB
-
Sample
241130-vg3kmayqbt
-
MD5
7aabeebd130a48ceb6d29db6338d46d5
-
SHA1
c72371a7cf6c472252b1d3f7c6e12d3de77e145c
-
SHA256
c6cb794e8febc4b598d491fe2c94e59cf45dfbc4ca97b03aded9277c918e3a9b
-
SHA512
d9bb873fa1768453d3fb3a1f9bbaf2b76a0b21717f86da24ed028876a4d470d014e443aaab24072487413a362d46e78ff52fac6dd8a923d2ec1efcb84016cfc7
-
SSDEEP
1536:4ZuttUdjLAQJaeeiIVrGbbXwUhktGiDpqKmY7:4ZuttUdjvJjeXGbbX7+9gz
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
following-geometry.gl.at.ply.gg:11493
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
setup.exe
-
install_folder
%AppData%
Targets
-
-
Target
Client.exe
-
Size
63KB
-
MD5
7aabeebd130a48ceb6d29db6338d46d5
-
SHA1
c72371a7cf6c472252b1d3f7c6e12d3de77e145c
-
SHA256
c6cb794e8febc4b598d491fe2c94e59cf45dfbc4ca97b03aded9277c918e3a9b
-
SHA512
d9bb873fa1768453d3fb3a1f9bbaf2b76a0b21717f86da24ed028876a4d470d014e443aaab24072487413a362d46e78ff52fac6dd8a923d2ec1efcb84016cfc7
-
SSDEEP
1536:4ZuttUdjLAQJaeeiIVrGbbXwUhktGiDpqKmY7:4ZuttUdjvJjeXGbbX7+9gz
Score10/10-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-