General

  • Target

    Avix.exe

  • Size

    114KB

  • Sample

    250101-hzvxaa1kcn

  • MD5

    724b790c9d782df5a52ca14ac32235db

  • SHA1

    26cb3b209100ed82968f97ff891909dfcf7af982

  • SHA256

    0e8cb86b94be8ce8dd3490f54025d2824cd36845b4e64d839303fbb4f6ec0a19

  • SHA512

    d7d17527ee7416a6830b0dd145b145ba0ab602a9b34797235e110cb7dfe17e23458884da159d3502e4e1303ca08654208e4273ad3d4b19caf7eecae91f0edb97

  • SSDEEP

    3072:sr85C/1bfUQLBYsUOcx/5bHfPMV6e9VdQsl:k9dbsC9aHfPMV6aesl

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

ninja

C2

127.0.0.1:4449

Mutex

yo

Attributes
  • delay

    1

  • install

    true

  • install_file

    yo.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Avix.exe

    • Size

      114KB

    • MD5

      724b790c9d782df5a52ca14ac32235db

    • SHA1

      26cb3b209100ed82968f97ff891909dfcf7af982

    • SHA256

      0e8cb86b94be8ce8dd3490f54025d2824cd36845b4e64d839303fbb4f6ec0a19

    • SHA512

      d7d17527ee7416a6830b0dd145b145ba0ab602a9b34797235e110cb7dfe17e23458884da159d3502e4e1303ca08654208e4273ad3d4b19caf7eecae91f0edb97

    • SSDEEP

      3072:sr85C/1bfUQLBYsUOcx/5bHfPMV6e9VdQsl:k9dbsC9aHfPMV6aesl

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks