General
-
Target
799e3743d0666a4d0def179260537e1711456f39949cc672ba356d15bca9c0be.vbs
-
Size
78KB
-
Sample
241213-c7j7vsxpgr
-
MD5
f4360392014f0bebc78d81bbf8b1bfec
-
SHA1
275ddf9b03cc98e1f0d599140e19c64d5a941fd9
-
SHA256
799e3743d0666a4d0def179260537e1711456f39949cc672ba356d15bca9c0be
-
SHA512
bfeded4bf8bd4e82226ec0b3b3abb7dfd9d328ce1216004bdd47bf997f3058a8cf8a5973ef4e01979dbfdb71cc2c9f73a731f70e58eec2106208d7dc08000a79
-
SSDEEP
1536:xO6AlDEJYMg1Z0BYBOMadTFA63RI3xMpFgLTljdKCHBlok:kblQJYZ1Z2YBLT2mSpFg6iEk
Static task
static1
Behavioral task
behavioral1
Sample
799e3743d0666a4d0def179260537e1711456f39949cc672ba356d15bca9c0be.vbs
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Dec2024
45.88.88.7:6845
zmkdvkzgwmnzhgvxwwk
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
799e3743d0666a4d0def179260537e1711456f39949cc672ba356d15bca9c0be.vbs
-
Size
78KB
-
MD5
f4360392014f0bebc78d81bbf8b1bfec
-
SHA1
275ddf9b03cc98e1f0d599140e19c64d5a941fd9
-
SHA256
799e3743d0666a4d0def179260537e1711456f39949cc672ba356d15bca9c0be
-
SHA512
bfeded4bf8bd4e82226ec0b3b3abb7dfd9d328ce1216004bdd47bf997f3058a8cf8a5973ef4e01979dbfdb71cc2c9f73a731f70e58eec2106208d7dc08000a79
-
SSDEEP
1536:xO6AlDEJYMg1Z0BYBOMadTFA63RI3xMpFgLTljdKCHBlok:kblQJYZ1Z2YBLT2mSpFg6iEk
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-