General

  • Target

    799e3743d0666a4d0def179260537e1711456f39949cc672ba356d15bca9c0be.vbs

  • Size

    78KB

  • Sample

    241213-c7j7vsxpgr

  • MD5

    f4360392014f0bebc78d81bbf8b1bfec

  • SHA1

    275ddf9b03cc98e1f0d599140e19c64d5a941fd9

  • SHA256

    799e3743d0666a4d0def179260537e1711456f39949cc672ba356d15bca9c0be

  • SHA512

    bfeded4bf8bd4e82226ec0b3b3abb7dfd9d328ce1216004bdd47bf997f3058a8cf8a5973ef4e01979dbfdb71cc2c9f73a731f70e58eec2106208d7dc08000a79

  • SSDEEP

    1536:xO6AlDEJYMg1Z0BYBOMadTFA63RI3xMpFgLTljdKCHBlok:kblQJYZ1Z2YBLT2mSpFg6iEk

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Dec2024

C2

45.88.88.7:6845

Mutex

zmkdvkzgwmnzhgvxwwk

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      799e3743d0666a4d0def179260537e1711456f39949cc672ba356d15bca9c0be.vbs

    • Size

      78KB

    • MD5

      f4360392014f0bebc78d81bbf8b1bfec

    • SHA1

      275ddf9b03cc98e1f0d599140e19c64d5a941fd9

    • SHA256

      799e3743d0666a4d0def179260537e1711456f39949cc672ba356d15bca9c0be

    • SHA512

      bfeded4bf8bd4e82226ec0b3b3abb7dfd9d328ce1216004bdd47bf997f3058a8cf8a5973ef4e01979dbfdb71cc2c9f73a731f70e58eec2106208d7dc08000a79

    • SSDEEP

      1536:xO6AlDEJYMg1Z0BYBOMadTFA63RI3xMpFgLTljdKCHBlok:kblQJYZ1Z2YBLT2mSpFg6iEk

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks