General
-
Target
List of Required PN#_Desc_&_Qty Details.vbs
-
Size
79KB
-
Sample
241212-rrve8aypar
-
MD5
c0e2ce250c4979a59970d22fd99f340f
-
SHA1
4e5ad3c3ed1e8871abfd8d0f8466b3ddbc521be0
-
SHA256
9f0e70dc0dcfc4cfdadd1e2d1c9678ed09a3e4d8eb2c742e454b8fe06256a7e2
-
SHA512
f6b43f831302a4760f0d6a8a6e822156b68423f6b0a8e313088007ec28e3e7fc0c9f1ba3659bdff7e7889faf6ec30eb8b826a0a3ebf8c3533b38b0318d483404
-
SSDEEP
1536:lcX2qy9/TpzprFm7xcGhX4y7t3t+JlpbebTQOsod:lcX2pl+HhXVxqild
Static task
static1
Behavioral task
behavioral1
Sample
List of Required PN#_Desc_&_Qty Details.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
List of Required PN#_Desc_&_Qty Details.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
OMEN core i9
45.88.88.7:4164
qqkyuzisfolbtlf
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
List of Required PN#_Desc_&_Qty Details.vbs
-
Size
79KB
-
MD5
c0e2ce250c4979a59970d22fd99f340f
-
SHA1
4e5ad3c3ed1e8871abfd8d0f8466b3ddbc521be0
-
SHA256
9f0e70dc0dcfc4cfdadd1e2d1c9678ed09a3e4d8eb2c742e454b8fe06256a7e2
-
SHA512
f6b43f831302a4760f0d6a8a6e822156b68423f6b0a8e313088007ec28e3e7fc0c9f1ba3659bdff7e7889faf6ec30eb8b826a0a3ebf8c3533b38b0318d483404
-
SSDEEP
1536:lcX2qy9/TpzprFm7xcGhX4y7t3t+JlpbebTQOsod:lcX2pl+HhXVxqild
Score10/10-
Asyncrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-