General
-
Target
Loader.bat
-
Size
5KB
-
Sample
241210-3m2vaazmdj
-
MD5
036ac78d84f772e72aff4fbc7b4173bc
-
SHA1
84e1145e5165e31ee8c8db00134fad7236ca66bc
-
SHA256
34e0e93a5bf239bc92b9fb15c93930d5d9dafb09d4986b8dddc180c56d0ddfb8
-
SHA512
c33205e7dda5630d7ebb42b72ad20a29eb0b7b7a2e0c47c75310087e7236a4434dd52c48a68bd3a76a258bc0d7008162679b1c28716d46c6210ad282986be099
-
SSDEEP
96:OTawvGrSZG7aZgXWp/Yejj7T+a8FMiXpFLv4Ltf:UaYQSZ5ZgKYejjnj9
Static task
static1
Behavioral task
behavioral1
Sample
Loader.bat
Resource
win7-20240708-en
Malware Config
Extracted
https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
66.66.146.74:9511
8906005788005HTGF
-
delay
1
-
install
true
-
install_file
WINDOWS.exe
-
install_folder
%AppData%
Targets
-
-
Target
Loader.bat
-
Size
5KB
-
MD5
036ac78d84f772e72aff4fbc7b4173bc
-
SHA1
84e1145e5165e31ee8c8db00134fad7236ca66bc
-
SHA256
34e0e93a5bf239bc92b9fb15c93930d5d9dafb09d4986b8dddc180c56d0ddfb8
-
SHA512
c33205e7dda5630d7ebb42b72ad20a29eb0b7b7a2e0c47c75310087e7236a4434dd52c48a68bd3a76a258bc0d7008162679b1c28716d46c6210ad282986be099
-
SSDEEP
96:OTawvGrSZG7aZgXWp/Yejj7T+a8FMiXpFLv4Ltf:UaYQSZ5ZgKYejjnj9
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1