General
-
Target
Client.exe
-
Size
74KB
-
Sample
241205-wahgjsvlc1
-
MD5
8d7fa55e8b19df35bec05d0f763aaebd
-
SHA1
7e611aac188610b808cc9d0ff8eb91f33b5a6fc1
-
SHA256
a7edb74c3ef9b545c28e4a291faab44d93338dcb78dcf1baab9569d286ef5405
-
SHA512
ec484ceee2ab704d1f5716a8f8d8b713791c750ecfb87ced75e401ffce32fc4d17c6ba7ea21dbd8feff852f681f1e69a3e3e7852ed170797f9952dd5d8a2ef0c
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/nSMfb/xQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bf6YxQYBY
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
147.185.221.24:17909
xftanyrkdmfog
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Client.exe
-
Size
74KB
-
MD5
8d7fa55e8b19df35bec05d0f763aaebd
-
SHA1
7e611aac188610b808cc9d0ff8eb91f33b5a6fc1
-
SHA256
a7edb74c3ef9b545c28e4a291faab44d93338dcb78dcf1baab9569d286ef5405
-
SHA512
ec484ceee2ab704d1f5716a8f8d8b713791c750ecfb87ced75e401ffce32fc4d17c6ba7ea21dbd8feff852f681f1e69a3e3e7852ed170797f9952dd5d8a2ef0c
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/nSMfb/xQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bf6YxQYBY
-
Asyncrat family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1