General
-
Target
lq.bat
-
Size
39KB
-
Sample
241230-qtrxfawlhk
-
MD5
c052ebca60e2ce218b10804cb0cbc835
-
SHA1
cb24648a8bf6adb4807798d5cc6551bf1a9f148f
-
SHA256
bf0d1aa2019f057e23d62c1f8b69f63005a313057ff79592d2cdc28981c9d257
-
SHA512
e535443cb726ef0d52175cf7164aab93beddfa00c388793b199d64e5ac13cd8a8eb6e740c278b7845829fbdd452e5c8d65edc2e163149f080f7d4f10a96b44ab
-
SSDEEP
768:4yA400UEtvrU5cl7/2Vu2OHpi29NO150+5Rxbh:4yv+
Static task
static1
Behavioral task
behavioral1
Sample
lq.bat
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
111.90.143.248:4449
101.99.92.10:4449
kqsjiymxwcmgkmn
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Default
111.90.143.248:3232
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.0
101.99.92.10:8066
oUzmdOsTIy2HgRCx
-
install_file
USB.exe
Targets
-
-
Target
lq.bat
-
Size
39KB
-
MD5
c052ebca60e2ce218b10804cb0cbc835
-
SHA1
cb24648a8bf6adb4807798d5cc6551bf1a9f148f
-
SHA256
bf0d1aa2019f057e23d62c1f8b69f63005a313057ff79592d2cdc28981c9d257
-
SHA512
e535443cb726ef0d52175cf7164aab93beddfa00c388793b199d64e5ac13cd8a8eb6e740c278b7845829fbdd452e5c8d65edc2e163149f080f7d4f10a96b44ab
-
SSDEEP
768:4yA400UEtvrU5cl7/2Vu2OHpi29NO150+5Rxbh:4yv+
-
Asyncrat family
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Venomrat family
-
Xworm family
-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-