General
-
Target
AUNova.rar
-
Size
2.1MB
-
Sample
241201-cr9sksxren
-
MD5
90dd7f74a902efa9b2a18d4f5c8a99b0
-
SHA1
303dc3b169794f804e0c2f793c4ba87d17fc332c
-
SHA256
d527b83bd8a873e5087fc2ddb34ebaa5128ff02d418d75448a59b87cbe1f4e13
-
SHA512
1abd3a572ea784f25f2a3224177c9660da25784b3cf53561a6549009aae19c4977cc8e097a44ff0405962a63df2ea7f47a63418c69f585a6a84cf68694bd9e6b
-
SSDEEP
49152:S/j/Elbkphy1iCPIziZNQ8Hq3B9kjm+Qz1gV9:Ej/Sz1xwziZC8KRWV9
Static task
static1
Behavioral task
behavioral1
Sample
AUNova.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AUNova.rar
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.161.193.99:53757
hsaurcrgqwhjimnkbht
-
delay
1
-
install
true
-
install_file
Load.exe
-
install_folder
%AppData%
Targets
-
-
Target
AUNova.rar
-
Size
2.1MB
-
MD5
90dd7f74a902efa9b2a18d4f5c8a99b0
-
SHA1
303dc3b169794f804e0c2f793c4ba87d17fc332c
-
SHA256
d527b83bd8a873e5087fc2ddb34ebaa5128ff02d418d75448a59b87cbe1f4e13
-
SHA512
1abd3a572ea784f25f2a3224177c9660da25784b3cf53561a6549009aae19c4977cc8e097a44ff0405962a63df2ea7f47a63418c69f585a6a84cf68694bd9e6b
-
SSDEEP
49152:S/j/Elbkphy1iCPIziZNQ8Hq3B9kjm+Qz1gV9:Ej/Sz1xwziZC8KRWV9
-
Asyncrat family
-
Xmrig family
-
Async RAT payload
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1