General
-
Target
58f0420c1b0b04f11ca26a87616bb032360d9a12475712f700be3e1d248c28c1.exe
-
Size
369KB
-
Sample
241222-eg14sssmhv
-
MD5
2fd0b895bf8132884dd68465a1d516f6
-
SHA1
83c48ee12b44ebb14f0c75c0d7f2f46d53c93cef
-
SHA256
58f0420c1b0b04f11ca26a87616bb032360d9a12475712f700be3e1d248c28c1
-
SHA512
de4d8e599b52da46df6c9ef024d6fc471ed736148c285c409fb039e487efb28c95abe2b29e79cdb9a3d87c92578569c2fb3a7f231833d5304cba0eac55ccb9d1
-
SSDEEP
3072:Nv588HEAmjc+U1B4/gjybW0z4j0+uidj2A3v1Z4voth3jLD+uFaZ:1EAmg++41G2gD4sPSZ
Static task
static1
Behavioral task
behavioral1
Sample
58f0420c1b0b04f11ca26a87616bb032360d9a12475712f700be3e1d248c28c1.exe
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
51.161.12.215:4449
olzlzaglbcqbb
-
delay
9
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
58f0420c1b0b04f11ca26a87616bb032360d9a12475712f700be3e1d248c28c1.exe
-
Size
369KB
-
MD5
2fd0b895bf8132884dd68465a1d516f6
-
SHA1
83c48ee12b44ebb14f0c75c0d7f2f46d53c93cef
-
SHA256
58f0420c1b0b04f11ca26a87616bb032360d9a12475712f700be3e1d248c28c1
-
SHA512
de4d8e599b52da46df6c9ef024d6fc471ed736148c285c409fb039e487efb28c95abe2b29e79cdb9a3d87c92578569c2fb3a7f231833d5304cba0eac55ccb9d1
-
SSDEEP
3072:Nv588HEAmjc+U1B4/gjybW0z4j0+uidj2A3v1Z4voth3jLD+uFaZ:1EAmg++41G2gD4sPSZ
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-