General
-
Target
28b1a7f0f1af2cf9f5529390afae54f9858b50a88f0154896e14b74fd5c7e148.exe
-
Size
74KB
-
Sample
250108-vr1tsaypfp
-
MD5
4699152c9c6718bfd6ecbdc0c7cc53af
-
SHA1
104f5583bc2709197ef929ddc5bbe16f08ee0229
-
SHA256
28b1a7f0f1af2cf9f5529390afae54f9858b50a88f0154896e14b74fd5c7e148
-
SHA512
3d2d6910b903caf50b59191eb2b33a01f41d55212431d9aa0009e63e2361259a12552bb5b9a6cf17d79c56fb5e0f0444fc249fb0dadf79bd76d9b912b893ac32
-
SSDEEP
1536:eUYNwcxKHXwzCtmPMV3JSaGLm43XHIls1bP/7jnQzcyLVclNv:eUYicxK8WmPMV3wDn4s1bPTbQjBYN
Behavioral task
behavioral1
Sample
28b1a7f0f1af2cf9f5529390afae54f9858b50a88f0154896e14b74fd5c7e148.exe
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:9999
ytgjjhywchk
-
delay
1
-
install
true
-
install_file
RealtekHighDefinitionAudio.exe
-
install_folder
%AppData%
Targets
-
-
Target
28b1a7f0f1af2cf9f5529390afae54f9858b50a88f0154896e14b74fd5c7e148.exe
-
Size
74KB
-
MD5
4699152c9c6718bfd6ecbdc0c7cc53af
-
SHA1
104f5583bc2709197ef929ddc5bbe16f08ee0229
-
SHA256
28b1a7f0f1af2cf9f5529390afae54f9858b50a88f0154896e14b74fd5c7e148
-
SHA512
3d2d6910b903caf50b59191eb2b33a01f41d55212431d9aa0009e63e2361259a12552bb5b9a6cf17d79c56fb5e0f0444fc249fb0dadf79bd76d9b912b893ac32
-
SSDEEP
1536:eUYNwcxKHXwzCtmPMV3JSaGLm43XHIls1bP/7jnQzcyLVclNv:eUYicxK8WmPMV3wDn4s1bPTbQjBYN
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-