General

  • Target

    Client.exe

  • Size

    78KB

  • Sample

    250104-mpjhqaxqhn

  • MD5

    39afdfecb59c1dc6656f76a458e91684

  • SHA1

    e7e99b64fcbbd4faecad0e953b22147040293ef5

  • SHA256

    d9b2a57f408ffac54b1243ef5d0311a3b9548c868d48216195d5c4efbfd53e7a

  • SHA512

    30a05fb653d38f2093a7b45dffd93141890a0d378c616aaa5045ab21899730169e2cf21d4fb98a18df9fdfa9775b9c002f973d79e230053dbce6c28d7f29211f

  • SSDEEP

    1536:kn9Otw9zJ14+qkEAjR7XBWPz5Gq8mzOD1btS6JAduU1:kn9O+jq+q1ABXGmm6D1btZPq

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

dmcszhekydwkmqm

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/6ZBHT1SN

aes.plain

Targets

    • Target

      Client.exe

    • Size

      78KB

    • MD5

      39afdfecb59c1dc6656f76a458e91684

    • SHA1

      e7e99b64fcbbd4faecad0e953b22147040293ef5

    • SHA256

      d9b2a57f408ffac54b1243ef5d0311a3b9548c868d48216195d5c4efbfd53e7a

    • SHA512

      30a05fb653d38f2093a7b45dffd93141890a0d378c616aaa5045ab21899730169e2cf21d4fb98a18df9fdfa9775b9c002f973d79e230053dbce6c28d7f29211f

    • SSDEEP

      1536:kn9Otw9zJ14+qkEAjR7XBWPz5Gq8mzOD1btS6JAduU1:kn9O+jq+q1ABXGmm6D1btZPq

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks