General

  • Target

    31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe

  • Size

    950KB

  • Sample

    250111-db75gsznhs

  • MD5

    a8a4aa9c047894582f100213370da8de

  • SHA1

    e7b4d9747c787599947d9944cc90ed36c31984b4

  • SHA256

    31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7

  • SHA512

    235b0a604d73ea9a45c3db63693cf1a6ee3f38ea783c22568af233252a41c7018dd77b96f70020e2e97c0f2843b316b270a023d95983c55cdc72c6ecc86df0c9

  • SSDEEP

    24576:Gu6J33O0c+JY5UZ+XC0kGso6Fat0svhWWY:Iu0c++OCvkGs9Fat0sv7Y

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

87.120.120.15:4449

Mutex

ykpleyrgtopul

Attributes
  • delay

    10

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe

    • Size

      950KB

    • MD5

      a8a4aa9c047894582f100213370da8de

    • SHA1

      e7b4d9747c787599947d9944cc90ed36c31984b4

    • SHA256

      31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7

    • SHA512

      235b0a604d73ea9a45c3db63693cf1a6ee3f38ea783c22568af233252a41c7018dd77b96f70020e2e97c0f2843b316b270a023d95983c55cdc72c6ecc86df0c9

    • SSDEEP

      24576:Gu6J33O0c+JY5UZ+XC0kGso6Fat0svhWWY:Iu0c++OCvkGs9Fat0sv7Y

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks