General

  • Target

    Petya and GoldenEye BUILDER.exe

  • Size

    258KB

  • Sample

    250101-j9yxcsslgp

  • MD5

    fe311cbf28e46b0bbfbd7e848ac6867b

  • SHA1

    14b231291b8370fa08da5fec80cf96ac713971f6

  • SHA256

    36ae29df569363f2ab310bbfab894f449c530f8b1f0320f42714cb26cd744750

  • SHA512

    8835a89c2f52ef10e5363c5caf9cebb94f3402a8d37aa0460f95307b6e3f626c5ced6220e92a6fa875b9dffe118ac15adcd8d01a5771c8d2cd951966e7571838

  • SSDEEP

    1536:EbJWf9d1f5oua8byL76pmqMQoXhVN4aooJhDCSGyfel82WNxK:Ebkf9d1zRGL7NTXh/sEhD4yfdNxK

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

Mutex

ioehvaokzsdfxllja

Attributes
  • delay

    1

  • install

    true

  • install_file

    gg.exe

  • install_folder

    %Temp%

aes.plain

Targets

    • Target

      Petya and GoldenEye BUILDER.exe

    • Size

      258KB

    • MD5

      fe311cbf28e46b0bbfbd7e848ac6867b

    • SHA1

      14b231291b8370fa08da5fec80cf96ac713971f6

    • SHA256

      36ae29df569363f2ab310bbfab894f449c530f8b1f0320f42714cb26cd744750

    • SHA512

      8835a89c2f52ef10e5363c5caf9cebb94f3402a8d37aa0460f95307b6e3f626c5ced6220e92a6fa875b9dffe118ac15adcd8d01a5771c8d2cd951966e7571838

    • SSDEEP

      1536:EbJWf9d1f5oua8byL76pmqMQoXhVN4aooJhDCSGyfel82WNxK:Ebkf9d1zRGL7NTXh/sEhD4yfdNxK

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks