General

  • Target

    45a80ba3066dcff272b2fdc8d539a49e28ad5a7404fbdeabdd19a85875fc3472.exe

  • Size

    74KB

  • Sample

    241205-s6lx3axjgm

  • MD5

    c23fb41bf1291c1dfd46b2dc66119476

  • SHA1

    33eb3a59f857c53be69a8f555efabf643784ad11

  • SHA256

    45a80ba3066dcff272b2fdc8d539a49e28ad5a7404fbdeabdd19a85875fc3472

  • SHA512

    7fe45ab30263be55b7fec83557a8f80534fb28ab6274cba721ac4b8ca5dcc9c47bc43ef0c726966f2aa438d00adff85da5cae09fcbd1e687c77ae345f5c2bd3a

  • SSDEEP

    1536:5UNQcx6ZoCrGPMVU+/sIRH1bJ/SOlgNQzcyLVclNP:5Uicx6qQGPMVU+/PH1bJbl8QjBYt

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:1177

127.0.0.1:21053

187.18.72.113:1177

187.18.72.113:21053

189.14.62.242:1177

189.14.62.242:21053

192.168.1.6:1177

192.168.1.6:21053

210.53.210.53:1177

210.53.210.53:21053

10.9.237.62:1177

10.9.237.62:21053

Mutex

aewfcdorqvoec

Attributes
  • delay

    1

  • install

    true

  • install_file

    start.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      45a80ba3066dcff272b2fdc8d539a49e28ad5a7404fbdeabdd19a85875fc3472.exe

    • Size

      74KB

    • MD5

      c23fb41bf1291c1dfd46b2dc66119476

    • SHA1

      33eb3a59f857c53be69a8f555efabf643784ad11

    • SHA256

      45a80ba3066dcff272b2fdc8d539a49e28ad5a7404fbdeabdd19a85875fc3472

    • SHA512

      7fe45ab30263be55b7fec83557a8f80534fb28ab6274cba721ac4b8ca5dcc9c47bc43ef0c726966f2aa438d00adff85da5cae09fcbd1e687c77ae345f5c2bd3a

    • SSDEEP

      1536:5UNQcx6ZoCrGPMVU+/sIRH1bJ/SOlgNQzcyLVclNP:5Uicx6qQGPMVU+/PH1bJbl8QjBYt

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks