General
-
Target
test.bat
-
Size
356B
-
Sample
241210-2wt1cstlbz
-
MD5
0db6431e1e0b528c1003b75a3c10c0fb
-
SHA1
392315f341dffee2f2abaea389f171c55be0299e
-
SHA256
08715f8a4d0627387a6eb1294d90a936551cada622a8377592adbac9eba76ec6
-
SHA512
f5fd7505003070cbe2c37531137d9a800d5acbedf08bc638a9c54ed93bb41bb8f14a37f821e645bae2d39f9ad019033ba55ee3f69114a21fc132c19fa33f8a84
Static task
static1
Malware Config
Extracted
https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
66.66.146.74:9511
8906005788005HTGF
-
delay
1
-
install
true
-
install_file
WINDOWS.exe
-
install_folder
%AppData%
Targets
-
-
Target
test.bat
-
Size
356B
-
MD5
0db6431e1e0b528c1003b75a3c10c0fb
-
SHA1
392315f341dffee2f2abaea389f171c55be0299e
-
SHA256
08715f8a4d0627387a6eb1294d90a936551cada622a8377592adbac9eba76ec6
-
SHA512
f5fd7505003070cbe2c37531137d9a800d5acbedf08bc638a9c54ed93bb41bb8f14a37f821e645bae2d39f9ad019033ba55ee3f69114a21fc132c19fa33f8a84
-
Asyncrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-