General

  • Target

    e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0

  • Size

    472KB

  • Sample

    250106-ybz44avres

  • MD5

    d48749ab6904e01401b9550cc7767174

  • SHA1

    c468b69ee0e1a471d0f1e4751c12f7f32e2ce946

  • SHA256

    e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0

  • SHA512

    7388c3fdfd989343474281712c115e914f17442755441f9bfb0f64b9f922e1eec765d2374f93ccf60d856ff966464974033e66fceb78a5ff86228a5cfc4ce925

  • SSDEEP

    12288:zdR/L2wA8UePhGtFUof97VpKV9jQ9T3dD/:LL3AfesCs3h/

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

8.218.196.187:4449

127.0.0.1:4449

Mutex

vidjpdoqlri

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0

    • Size

      472KB

    • MD5

      d48749ab6904e01401b9550cc7767174

    • SHA1

      c468b69ee0e1a471d0f1e4751c12f7f32e2ce946

    • SHA256

      e53d0063932826c931e98c9c3a9ac20f0ccab9724d4ed646711f61a3a16ee1f0

    • SHA512

      7388c3fdfd989343474281712c115e914f17442755441f9bfb0f64b9f922e1eec765d2374f93ccf60d856ff966464974033e66fceb78a5ff86228a5cfc4ce925

    • SSDEEP

      12288:zdR/L2wA8UePhGtFUof97VpKV9jQ9T3dD/:LL3AfesCs3h/

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks