General

  • Target

    58f0420c1b0b04f11ca26a87616bb032360d9a12475712f700be3e1d248c28c1.exe

  • Size

    369KB

  • Sample

    241222-eg14sssmhv

  • MD5

    2fd0b895bf8132884dd68465a1d516f6

  • SHA1

    83c48ee12b44ebb14f0c75c0d7f2f46d53c93cef

  • SHA256

    58f0420c1b0b04f11ca26a87616bb032360d9a12475712f700be3e1d248c28c1

  • SHA512

    de4d8e599b52da46df6c9ef024d6fc471ed736148c285c409fb039e487efb28c95abe2b29e79cdb9a3d87c92578569c2fb3a7f231833d5304cba0eac55ccb9d1

  • SSDEEP

    3072:Nv588HEAmjc+U1B4/gjybW0z4j0+uidj2A3v1Z4voth3jLD+uFaZ:1EAmg++41G2gD4sPSZ

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

51.161.12.215:4449

Mutex

olzlzaglbcqbb

Attributes
  • delay

    9

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      58f0420c1b0b04f11ca26a87616bb032360d9a12475712f700be3e1d248c28c1.exe

    • Size

      369KB

    • MD5

      2fd0b895bf8132884dd68465a1d516f6

    • SHA1

      83c48ee12b44ebb14f0c75c0d7f2f46d53c93cef

    • SHA256

      58f0420c1b0b04f11ca26a87616bb032360d9a12475712f700be3e1d248c28c1

    • SHA512

      de4d8e599b52da46df6c9ef024d6fc471ed736148c285c409fb039e487efb28c95abe2b29e79cdb9a3d87c92578569c2fb3a7f231833d5304cba0eac55ccb9d1

    • SSDEEP

      3072:Nv588HEAmjc+U1B4/gjybW0z4j0+uidj2A3v1Z4voth3jLD+uFaZ:1EAmg++41G2gD4sPSZ

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks