General
-
Target
test.bat
-
Size
1KB
-
Sample
241210-2xnvqstlex
-
MD5
b78408977228a09e62dca22d338feafb
-
SHA1
fac271d4467a36e7ca0b01a81e233e70e200c847
-
SHA256
7ed2dbc79e11bcea58da5489f14b40343d5d1962afc1dc97a17ee42bf93cd49c
-
SHA512
37a904d1fb2d03ec32582be38b3a242c63e3ce7f8d1a958327760ba1f8c5545801fb0645b97ff52ca141391bcb7f2ba743f7d11f616a4ba96d0abac6d949cf43
Static task
static1
Malware Config
Extracted
https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
66.66.146.74:9511
8906005788005HTGF
-
delay
1
-
install
true
-
install_file
WINDOWS.exe
-
install_folder
%AppData%
Targets
-
-
Target
test.bat
-
Size
1KB
-
MD5
b78408977228a09e62dca22d338feafb
-
SHA1
fac271d4467a36e7ca0b01a81e233e70e200c847
-
SHA256
7ed2dbc79e11bcea58da5489f14b40343d5d1962afc1dc97a17ee42bf93cd49c
-
SHA512
37a904d1fb2d03ec32582be38b3a242c63e3ce7f8d1a958327760ba1f8c5545801fb0645b97ff52ca141391bcb7f2ba743f7d11f616a4ba96d0abac6d949cf43
-
Asyncrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-