General
-
Target
lol.bat
-
Size
272B
-
Sample
241210-2rhfrstjew
-
MD5
bbcb8363229c568f8a50a6e06e90d27c
-
SHA1
bb2cedb7ab72648e4b63940a0f2de83d2d34c447
-
SHA256
bb7ad16471d922ca93fb343372dba6034cfdd536831a395e4054c7d9d2ff6664
-
SHA512
fe230e3253930c00ac07ec5ea2fe4e2756dcd725a17ccdb9d3c1fe502ffa6ddb65c955ac3818c2de5b2a62faaaa6ad6e34ac767475288ee39bb59018f8f2236c
Static task
static1
Malware Config
Extracted
https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
66.66.146.74:9511
8906005788005HTGF
-
delay
1
-
install
true
-
install_file
WINDOWS.exe
-
install_folder
%AppData%
Targets
-
-
Target
lol.bat
-
Size
272B
-
MD5
bbcb8363229c568f8a50a6e06e90d27c
-
SHA1
bb2cedb7ab72648e4b63940a0f2de83d2d34c447
-
SHA256
bb7ad16471d922ca93fb343372dba6034cfdd536831a395e4054c7d9d2ff6664
-
SHA512
fe230e3253930c00ac07ec5ea2fe4e2756dcd725a17ccdb9d3c1fe502ffa6ddb65c955ac3818c2de5b2a62faaaa6ad6e34ac767475288ee39bb59018f8f2236c
-
Asyncrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-