General
-
Target
Petya and GoldenEye BUILDER.exe
-
Size
258KB
-
Sample
250101-j9yxcsslgp
-
MD5
fe311cbf28e46b0bbfbd7e848ac6867b
-
SHA1
14b231291b8370fa08da5fec80cf96ac713971f6
-
SHA256
36ae29df569363f2ab310bbfab894f449c530f8b1f0320f42714cb26cd744750
-
SHA512
8835a89c2f52ef10e5363c5caf9cebb94f3402a8d37aa0460f95307b6e3f626c5ced6220e92a6fa875b9dffe118ac15adcd8d01a5771c8d2cd951966e7571838
-
SSDEEP
1536:EbJWf9d1f5oua8byL76pmqMQoXhVN4aooJhDCSGyfel82WNxK:Ebkf9d1zRGL7NTXh/sEhD4yfdNxK
Static task
static1
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
ioehvaokzsdfxllja
-
delay
1
-
install
true
-
install_file
gg.exe
-
install_folder
%Temp%
Targets
-
-
Target
Petya and GoldenEye BUILDER.exe
-
Size
258KB
-
MD5
fe311cbf28e46b0bbfbd7e848ac6867b
-
SHA1
14b231291b8370fa08da5fec80cf96ac713971f6
-
SHA256
36ae29df569363f2ab310bbfab894f449c530f8b1f0320f42714cb26cd744750
-
SHA512
8835a89c2f52ef10e5363c5caf9cebb94f3402a8d37aa0460f95307b6e3f626c5ced6220e92a6fa875b9dffe118ac15adcd8d01a5771c8d2cd951966e7571838
-
SSDEEP
1536:EbJWf9d1f5oua8byL76pmqMQoXhVN4aooJhDCSGyfel82WNxK:Ebkf9d1zRGL7NTXh/sEhD4yfdNxK
-
Asyncrat family
-
A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-