General
-
Target
WindowsDF.exe
-
Size
74KB
-
Sample
241203-1sewla1rbq
-
MD5
3cedbc72cc821f346b56100c311f7caf
-
SHA1
09d762e1d9ec34854c50ab8c7063f7d44fd3165e
-
SHA256
1583c039098be20a5d2076827affa434a8fd385f8e629ecdcdf44750d08dfbe2
-
SHA512
04237742a94275fa68fb91b5a9d4dfd0f54174a6504bd726d63d53791dad2acc62356a74b8c0f2284fa93ad509468092c12fb1dc92c583d8197187b03b6301fa
-
SSDEEP
1536:/Uq0cxVGlCBiPMVsOieqIbW1bh/k0owuQzcKLVclN:/UTcxVMWiPMVTHW1bhvCQ7BY
Behavioral task
behavioral1
Sample
WindowsDF.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
189.14.53.123:1177
189.14.53.123:21053
cijkkekfusbnuncqp
-
delay
1
-
install
true
-
install_file
WindowsDefender.exe
-
install_folder
%AppData%
Targets
-
-
Target
WindowsDF.exe
-
Size
74KB
-
MD5
3cedbc72cc821f346b56100c311f7caf
-
SHA1
09d762e1d9ec34854c50ab8c7063f7d44fd3165e
-
SHA256
1583c039098be20a5d2076827affa434a8fd385f8e629ecdcdf44750d08dfbe2
-
SHA512
04237742a94275fa68fb91b5a9d4dfd0f54174a6504bd726d63d53791dad2acc62356a74b8c0f2284fa93ad509468092c12fb1dc92c583d8197187b03b6301fa
-
SSDEEP
1536:/Uq0cxVGlCBiPMVsOieqIbW1bh/k0owuQzcKLVclN:/UTcxVMWiPMVTHW1bhvCQ7BY
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-