General
-
Target
Payment Remittance Advice Details.vbs
-
Size
67KB
-
Sample
241212-rrve8axjas
-
MD5
9ffb1e62265a9b36d8c29afafc14f6fe
-
SHA1
7e0abfdff1019bf28267f069b6fdf6658eb742b5
-
SHA256
b89759e93738b1b607e48a29f62bfda31e555b0aad30614c261ddf4ba10bdcdf
-
SHA512
7458a2fb582a0a314ff9d443515ab4379e9a71e26ccf0788e971898b32be58b64f82771dfc901eafe9e28db0755146432f02be5892fb64188c129e72f3d402f0
-
SSDEEP
1536:VpR0fCWy9wwuo9MIA9Y31BYfHAoH7XpUoQ0tThvi:j8vwwI9Mz9Y3GZ19Q6hvi
Static task
static1
Behavioral task
behavioral1
Sample
Payment Remittance Advice Details.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment Remittance Advice Details.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
py 2024
45.88.88.7:6987
vojifcrudluxshc
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Payment Remittance Advice Details.vbs
-
Size
67KB
-
MD5
9ffb1e62265a9b36d8c29afafc14f6fe
-
SHA1
7e0abfdff1019bf28267f069b6fdf6658eb742b5
-
SHA256
b89759e93738b1b607e48a29f62bfda31e555b0aad30614c261ddf4ba10bdcdf
-
SHA512
7458a2fb582a0a314ff9d443515ab4379e9a71e26ccf0788e971898b32be58b64f82771dfc901eafe9e28db0755146432f02be5892fb64188c129e72f3d402f0
-
SSDEEP
1536:VpR0fCWy9wwuo9MIA9Y31BYfHAoH7XpUoQ0tThvi:j8vwwI9Mz9Y3GZ19Q6hvi
Score10/10-
Asyncrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-