General
-
Target
germ.bat
-
Size
44KB
-
Sample
241202-t1htwsskc1
-
MD5
cdbebe5916a327e5cb724137f5fa439d
-
SHA1
7595a9c2978344b9be73c9478c1d6bac128bf0a3
-
SHA256
eb0f82f6f7cae84885ef1c829836a368615045598db243904bfbd53d976e686d
-
SHA512
6ae8f6c3fd0288ac1844e1cd84272220e3b9fa082dba0a27294ff83961f7a71e8b1924f46cc758bf3273d5c80862c451c6951500546e4827be0ed5cac67adbe7
-
SSDEEP
768:fkRLJpCVvO1FA++aIWoECcej7NuIEEv8MYW+ANdZbQwex1LIGbtmCFQy5sZ72fne:tNO1FA++aeECf3A9M
Static task
static1
Behavioral task
behavioral1
Sample
germ.bat
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
111.90.143.248:4449
kqsjiymxwcmgkmn
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Default
111.90.143.248:3232
111.90.143.143:3232
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.0
111.90.143.143:7000
mVXOUHi2OrYslEh1
-
install_file
USB.exe
Targets
-
-
Target
germ.bat
-
Size
44KB
-
MD5
cdbebe5916a327e5cb724137f5fa439d
-
SHA1
7595a9c2978344b9be73c9478c1d6bac128bf0a3
-
SHA256
eb0f82f6f7cae84885ef1c829836a368615045598db243904bfbd53d976e686d
-
SHA512
6ae8f6c3fd0288ac1844e1cd84272220e3b9fa082dba0a27294ff83961f7a71e8b1924f46cc758bf3273d5c80862c451c6951500546e4827be0ed5cac67adbe7
-
SSDEEP
768:fkRLJpCVvO1FA++aIWoECcej7NuIEEv8MYW+ANdZbQwex1LIGbtmCFQy5sZ72fne:tNO1FA++aeECf3A9M
-
Asyncrat family
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-