General
-
Target
MicroStrap.exe
-
Size
74KB
-
Sample
250111-t6ygjawnbq
-
MD5
9785b81af0d8b024dadd31659a3a2d24
-
SHA1
14f4539dc755b69ad28f9c1953aeec3620669588
-
SHA256
fec63e2ee9e830df5298bd72464fe6753a60a5ef14bd3023e9ab99260878b3df
-
SHA512
002df3d93cde212d4a9678f167201599d5e874defe15f2e46494d72f442692bf62a8fcfa226963f0575335f0b1062a61508ca143b95614eef4a6d7cd563c5120
-
SSDEEP
1536:OUKkcx9pXCTyPMVEZ8kyIgH1bO/zeoBDQzcOLVclN:OUDcx958yPMVEZ81H1bOLRDQHBY
Behavioral task
behavioral1
Sample
MicroStrap.exe
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
195.88.218.126:2404
rnxgsvfqmra
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
MicroStrap.exe
-
Size
74KB
-
MD5
9785b81af0d8b024dadd31659a3a2d24
-
SHA1
14f4539dc755b69ad28f9c1953aeec3620669588
-
SHA256
fec63e2ee9e830df5298bd72464fe6753a60a5ef14bd3023e9ab99260878b3df
-
SHA512
002df3d93cde212d4a9678f167201599d5e874defe15f2e46494d72f442692bf62a8fcfa226963f0575335f0b1062a61508ca143b95614eef4a6d7cd563c5120
-
SSDEEP
1536:OUKkcx9pXCTyPMVEZ8kyIgH1bO/zeoBDQzcOLVclN:OUDcx958yPMVEZ81H1bOLRDQHBY
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-