General
-
Target
Nigga.exe
-
Size
63KB
-
Sample
250114-ckapxawlgk
-
MD5
db88fc3e8338d1db8f973b1723356e9f
-
SHA1
71bc4bc780dc2b69f9b3d8f168ec64a2056d8f1e
-
SHA256
dc17f3ff3b95d3f1aa586e4b5087b16e7cf66684532204a5f03145c106bd0c99
-
SHA512
46224419143f59b7faabcd68e76378ed0fa51e7a9c50af80a35535753920df85735d56d5bffd6a28cf01642d2c2b568b2f796808bf5e05a8ba97b7ce98da5d1a
-
SSDEEP
1536:shBxLDlw0eEUzsUtmC6ZLBK3gbbOwUnDdGCDpqKmY7:shBxLDlw0dUvtmC6VBwgbbOVgz
Behavioral task
behavioral1
Sample
Nigga.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
5.0.5
Offsets
127.0.0.1:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
Nigga.exe
-
Size
63KB
-
MD5
db88fc3e8338d1db8f973b1723356e9f
-
SHA1
71bc4bc780dc2b69f9b3d8f168ec64a2056d8f1e
-
SHA256
dc17f3ff3b95d3f1aa586e4b5087b16e7cf66684532204a5f03145c106bd0c99
-
SHA512
46224419143f59b7faabcd68e76378ed0fa51e7a9c50af80a35535753920df85735d56d5bffd6a28cf01642d2c2b568b2f796808bf5e05a8ba97b7ce98da5d1a
-
SSDEEP
1536:shBxLDlw0eEUzsUtmC6ZLBK3gbbOwUnDdGCDpqKmY7:shBxLDlw0dUvtmC6VBwgbbOVgz
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-