General
-
Target
b736623441dcad195ea6687281e8ead850c5b1c690d896f1d942abd52e1a86a5.vbs
-
Size
67KB
-
Sample
241213-dh7gjaykdq
-
MD5
0eccd58bd629893c13a11881a4707538
-
SHA1
0c6eb5b4ca3e92c44ea8b8e9d0841189aeb7d554
-
SHA256
b736623441dcad195ea6687281e8ead850c5b1c690d896f1d942abd52e1a86a5
-
SHA512
25a8c044df81bd1e953922f897616eacb615e68e1a0e33d7606c1f4f42913c62826090e5ac4d9a7a62c20284c7206182df3b9999b7704aed692d7933015608b8
-
SSDEEP
1536:hvakp9tDsWXM2yd+DeYq4Vi5QBCOXU3T18Foc:tJTZrXw+i++cCOXAjc
Static task
static1
Behavioral task
behavioral1
Sample
b736623441dcad195ea6687281e8ead850c5b1c690d896f1d942abd52e1a86a5.vbs
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
py 2024
45.88.88.7:6987
vojifcrudluxshc
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
b736623441dcad195ea6687281e8ead850c5b1c690d896f1d942abd52e1a86a5.vbs
-
Size
67KB
-
MD5
0eccd58bd629893c13a11881a4707538
-
SHA1
0c6eb5b4ca3e92c44ea8b8e9d0841189aeb7d554
-
SHA256
b736623441dcad195ea6687281e8ead850c5b1c690d896f1d942abd52e1a86a5
-
SHA512
25a8c044df81bd1e953922f897616eacb615e68e1a0e33d7606c1f4f42913c62826090e5ac4d9a7a62c20284c7206182df3b9999b7704aed692d7933015608b8
-
SSDEEP
1536:hvakp9tDsWXM2yd+DeYq4Vi5QBCOXU3T18Foc:tJTZrXw+i++cCOXAjc
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-