General
-
Target
Image-logger1.exe
-
Size
74KB
-
Sample
241202-sre6zavndp
-
MD5
269dcdc4f147e62cec52eb56cbac81c5
-
SHA1
5d53e087a271ee7fc9b308332ba14ef0d4e1df11
-
SHA256
0e98e910ed50618f8ad181e371c197d6342215753b7938d75358a1351423f1e3
-
SHA512
471b829779ea601830d95044f66e7103d785fefacadfafda4e721f103da69d929c6dae3e10e795bf896edd08c4122a3b45a565ea9a8433d72b3c4e6640dd1570
-
SSDEEP
1536:fUqUcxgAkC4fsiPMVw6edjOXqIgH1bq/fkDbUpQzceLVclN:fUTcxgTEiPMVw6edjOkH1bq34gpQ3BY
Behavioral task
behavioral1
Sample
Image-logger1.exe
Resource
win7-20240708-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Windows
147.185.221.19:29253
doxtiisforiqxq
-
delay
1
-
install
true
-
install_file
ProgramFile.exe
-
install_folder
%AppData%
Targets
-
-
Target
Image-logger1.exe
-
Size
74KB
-
MD5
269dcdc4f147e62cec52eb56cbac81c5
-
SHA1
5d53e087a271ee7fc9b308332ba14ef0d4e1df11
-
SHA256
0e98e910ed50618f8ad181e371c197d6342215753b7938d75358a1351423f1e3
-
SHA512
471b829779ea601830d95044f66e7103d785fefacadfafda4e721f103da69d929c6dae3e10e795bf896edd08c4122a3b45a565ea9a8433d72b3c4e6640dd1570
-
SSDEEP
1536:fUqUcxgAkC4fsiPMVw6edjOXqIgH1bq/fkDbUpQzceLVclN:fUTcxgTEiPMVw6edjOkH1bq34gpQ3BY
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-