General
-
Target
4664-96-0x00000000007F0000-0x0000000000C52000-memory.dmp
-
Size
4.4MB
-
Sample
241210-r55s4sxrht
-
MD5
2f697edf39b22438ed6fcd0520b1de17
-
SHA1
57232e2845bc5b3c33318c9b7be5e85a6b539a56
-
SHA256
49cbe5413bbeeb0d715ddb61e692deb0294bd802d2044c4c1e51fe933d7d73e0
-
SHA512
65a3df2a559151fad437ac2eb4482cb0f754de2d4c818099b9075f99545b11bd49956e4c660d23d061043cea2686438f1a82d1b5770874beacd8c0c6d85d0300
-
SSDEEP
98304:0qO6xqDspu86X5jWOFWOcg0i9/COjIhkMfzhhMf:QfpSBHi1Dj2h
Behavioral task
behavioral1
Sample
4664-96-0x00000000007F0000-0x0000000000C52000-memory.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
4664-96-0x00000000007F0000-0x0000000000C52000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
205.209.109.10:4449
205.209.109.10:7723
clgbfqzkkypxjps
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
4664-96-0x00000000007F0000-0x0000000000C52000-memory.dmp
-
Size
4.4MB
-
MD5
2f697edf39b22438ed6fcd0520b1de17
-
SHA1
57232e2845bc5b3c33318c9b7be5e85a6b539a56
-
SHA256
49cbe5413bbeeb0d715ddb61e692deb0294bd802d2044c4c1e51fe933d7d73e0
-
SHA512
65a3df2a559151fad437ac2eb4482cb0f754de2d4c818099b9075f99545b11bd49956e4c660d23d061043cea2686438f1a82d1b5770874beacd8c0c6d85d0300
-
SSDEEP
98304:0qO6xqDspu86X5jWOFWOcg0i9/COjIhkMfzhhMf:QfpSBHi1Dj2h
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1