General

  • Target

    2024_exe_blacksnow_20596311672.zip

  • Size

    50KB

  • Sample

    250102-1h674awqc1

  • MD5

    90bf3bae96bde51ed8f551f1efb1a473

  • SHA1

    c406fb022d94a22d5d7c6faf4b5f175a9e56dc70

  • SHA256

    89acdbc8fdf507d3989f490932f2a8084c144f9c00628962c7f8241cad3f6c57

  • SHA512

    d9f1debbfbae85474214a3fe9340214e0a9d9ab99ea0b678c342048169c34621c889b5422bf390b457f7c3058053cec7336f45fb4b2f5bf7ccce8e2992effb02

  • SSDEEP

    1536:xq/0M7ouiepDoyeUPpyMZ/IWBiuCMCRRm++AqFiDX:soqpEyeQONMCKvBkb

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

2023

Mutex

2023

Attributes
  • delay

    1

  • install

    true

  • install_file

    2023.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/X5LTTgNb

aes.plain

Targets

    • Target

      8c9e60c37d9052d42f46e6eb364811d6c02f7478f9049be97979104f40a52049

    • Size

      88KB

    • MD5

      9d321e5bd15e7cb61d8fd256274caef2

    • SHA1

      adcd6d4792a93023971a4ad137ca61a71b2e30b3

    • SHA256

      8c9e60c37d9052d42f46e6eb364811d6c02f7478f9049be97979104f40a52049

    • SHA512

      073baca9e7f936d3932ef0788c605cbec62aebfc2d78a6febcc316d3912df582d1aeafb66dfa41500345f4a0fe1478631867c22c454e7841956a97e93517130b

    • SSDEEP

      1536:V5UFAcxqXPC/2PMVCe9VdQuDI6H1bf/EFOQzciu88uA9fKlA/LVclN:rUacxqfs2PMVCe9VdQsH1bfcFOQa88u7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks