General

  • Target

    Payload.rar.exe

  • Size

    74KB

  • Sample

    241226-yg3r6swret

  • MD5

    21b01a696d7a777088214c9e7c618194

  • SHA1

    8d9d322fbd23874357d5c472ab94bc03fa94ef0f

  • SHA256

    ed17e6958b1c5118a8e3cf1d3fe336c6acc2b83314c8d8aa0564e2037038fd6c

  • SHA512

    df9ed5704fd37a16e3c1807a4b5f6d7d969204ffbc50370030332b796a7c5cfbb6159f69876f0e5e9fd38438d42864f5e474ad0d04f1d815c9cbf674970ec6a3

  • SSDEEP

    1536:3Uyccxg0fCx6PMVd+yJ2MImH1b7/GzAQzcYZhVclN:3UjcxgYG6PMVd+/oH1b7ekQNZLY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

dwbvnhrqvezuppdgi

Attributes
  • delay

    1

  • install

    true

  • install_file

    Spoof.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/9ziMGwSG

aes.plain

Targets

    • Target

      Payload.rar.exe

    • Size

      74KB

    • MD5

      21b01a696d7a777088214c9e7c618194

    • SHA1

      8d9d322fbd23874357d5c472ab94bc03fa94ef0f

    • SHA256

      ed17e6958b1c5118a8e3cf1d3fe336c6acc2b83314c8d8aa0564e2037038fd6c

    • SHA512

      df9ed5704fd37a16e3c1807a4b5f6d7d969204ffbc50370030332b796a7c5cfbb6159f69876f0e5e9fd38438d42864f5e474ad0d04f1d815c9cbf674970ec6a3

    • SSDEEP

      1536:3Uyccxg0fCx6PMVd+yJ2MImH1b7/GzAQzcYZhVclN:3UjcxgYG6PMVd+/oH1b7ekQNZLY

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks