General
-
Target
2024_exe_blacksnow_20596311672.zip
-
Size
50KB
-
Sample
250102-1h674awqc1
-
MD5
90bf3bae96bde51ed8f551f1efb1a473
-
SHA1
c406fb022d94a22d5d7c6faf4b5f175a9e56dc70
-
SHA256
89acdbc8fdf507d3989f490932f2a8084c144f9c00628962c7f8241cad3f6c57
-
SHA512
d9f1debbfbae85474214a3fe9340214e0a9d9ab99ea0b678c342048169c34621c889b5422bf390b457f7c3058053cec7336f45fb4b2f5bf7ccce8e2992effb02
-
SSDEEP
1536:xq/0M7ouiepDoyeUPpyMZ/IWBiuCMCRRm++AqFiDX:soqpEyeQONMCKvBkb
Behavioral task
behavioral1
Sample
8c9e60c37d9052d42f46e6eb364811d6c02f7478f9049be97979104f40a52049.exe
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
2023
2023
-
delay
1
-
install
true
-
install_file
2023.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/X5LTTgNb
Targets
-
-
Target
8c9e60c37d9052d42f46e6eb364811d6c02f7478f9049be97979104f40a52049
-
Size
88KB
-
MD5
9d321e5bd15e7cb61d8fd256274caef2
-
SHA1
adcd6d4792a93023971a4ad137ca61a71b2e30b3
-
SHA256
8c9e60c37d9052d42f46e6eb364811d6c02f7478f9049be97979104f40a52049
-
SHA512
073baca9e7f936d3932ef0788c605cbec62aebfc2d78a6febcc316d3912df582d1aeafb66dfa41500345f4a0fe1478631867c22c454e7841956a97e93517130b
-
SSDEEP
1536:V5UFAcxqXPC/2PMVCe9VdQuDI6H1bf/EFOQzciu88uA9fKlA/LVclN:rUacxqfs2PMVCe9VdQsH1bfcFOQa88u7
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-