General
-
Target
JaffaCakes118_6810ad8ad8c3587dffb038e09ed2eb749fc4d7aafbad45eda8bc1423a6d48b47
-
Size
300.3MB
-
Sample
241230-wvl1gavnb1
-
MD5
a37e970e063fc479b417b52576e17092
-
SHA1
db379467c13db16bc7e97d39217539ae28336e53
-
SHA256
6810ad8ad8c3587dffb038e09ed2eb749fc4d7aafbad45eda8bc1423a6d48b47
-
SHA512
2dfe699aac1e0563ba7c5e36513dd06bad158906226381bf54af3f8d858b6d049490870526da51db9ac5b2ab2861ce30a518a1bfae61a87d628e75c66da3f55f
-
SSDEEP
3072:SndCXcnX7ChnAAD6OByB6/lEsu0rmvHsMvIBk5z:SdCLDpByS3ryHsMvIBkt
Static task
static1
Behavioral task
behavioral1
Sample
WKR001.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
WKR001.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
WKR002.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
WKR002.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
Venom Clients
ry8325585.duckdns.org:6087
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
https://schoolcrypter.com/dll_startup
Targets
-
-
Target
WKR001.EXE
-
Size
300.0MB
-
MD5
ec0d7bfce7fe535906d4cc5e8eaa977e
-
SHA1
04dd52f75415fee6f61077e07aa9e744de857b3a
-
SHA256
a766403403d3c3de2ff965fbf148bcd56048b56d10e4dc65a702566669855016
-
SHA512
02029fedd33ec22482bd7ec796fde86b462c1ee7a92a443a6a8306d7c42c2e1c32086db4b927465956c20e600028904db8b0580a7c23d9af83cf4f4e9c9a21d4
-
SSDEEP
3072:cndCXcnX7ChnAAD6OByB6/lEsu0rmvHsMvIBk5z:cdCLDpByS3ryHsMvIBkt
Score10/10-
Asyncrat family
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-
-
-
Target
WKR002.VBS
-
Size
236KB
-
MD5
7a52bb9f2fb57ce1bff8bd3f692d40ca
-
SHA1
bb39b944eb06e987eae9ccaa7f1d4b93bc72a89f
-
SHA256
93945370001cf9fb955aee425a60717a446a7e86c89edef0c8e862cbf588f0cb
-
SHA512
fe57c25777e12b3b563109e6186546286a05203650f089a02e179084a0bd48efc62e050d3efbb34089402686fdb53c9ed71347978d0d9b85602f5485ae32a1a3
-
SSDEEP
24:QnOilyjOMyE2aL8gVEuMvywFfV7N9Riwnwm43YQ7FYiVLneMDTFv9vPvW0mEOSRp:y16OeqyYLQeMHNOSAgHyLKhB
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-