General

  • Target

    List of Required PN#_Desc_&_Qty Details.vbs

  • Size

    79KB

  • Sample

    241212-rrve8aypar

  • MD5

    c0e2ce250c4979a59970d22fd99f340f

  • SHA1

    4e5ad3c3ed1e8871abfd8d0f8466b3ddbc521be0

  • SHA256

    9f0e70dc0dcfc4cfdadd1e2d1c9678ed09a3e4d8eb2c742e454b8fe06256a7e2

  • SHA512

    f6b43f831302a4760f0d6a8a6e822156b68423f6b0a8e313088007ec28e3e7fc0c9f1ba3659bdff7e7889faf6ec30eb8b826a0a3ebf8c3533b38b0318d483404

  • SSDEEP

    1536:lcX2qy9/TpzprFm7xcGhX4y7t3t+JlpbebTQOsod:lcX2pl+HhXVxqild

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

OMEN core i9

C2

45.88.88.7:4164

Mutex

qqkyuzisfolbtlf

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      List of Required PN#_Desc_&_Qty Details.vbs

    • Size

      79KB

    • MD5

      c0e2ce250c4979a59970d22fd99f340f

    • SHA1

      4e5ad3c3ed1e8871abfd8d0f8466b3ddbc521be0

    • SHA256

      9f0e70dc0dcfc4cfdadd1e2d1c9678ed09a3e4d8eb2c742e454b8fe06256a7e2

    • SHA512

      f6b43f831302a4760f0d6a8a6e822156b68423f6b0a8e313088007ec28e3e7fc0c9f1ba3659bdff7e7889faf6ec30eb8b826a0a3ebf8c3533b38b0318d483404

    • SSDEEP

      1536:lcX2qy9/TpzprFm7xcGhX4y7t3t+JlpbebTQOsod:lcX2pl+HhXVxqild

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks