General
-
Target
DemonSpoofCall.exe
-
Size
9.7MB
-
Sample
250122-wvnjaszjep
-
MD5
1dfe6d227d66658b9ab790ce66160551
-
SHA1
62087a4f6c0b47635f068262b3d9df15aab746d9
-
SHA256
c2d4aff226178355b8ef7b9e28e4d2869def12eacdfe91e9ed1135b6cd20deab
-
SHA512
c10e34658ea727c52f96051fd9fe6d3c1b6f3dbeed9b9ced6bbfd2819db3a8aaeea693f890581190d3d10749e3000f8088c543d8cd006301c0b3032c4457d454
-
SSDEEP
196608:lrkCDFxgtiWe4/RSgOqTn9nBIzuZrSW+xHGoFlaoDKWzQo1OIg5sa7t:5eiYRNXnDZrSF8oF9uB5B
Static task
static1
Behavioral task
behavioral1
Sample
DemonSpoofCall.exe
Resource
win10ltsc2021-20250113-de
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:6606
89.84.63.139:6606
caqxyzoxvrzhnrxwoc
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
DemonSpoofCall.exe
-
Size
9.7MB
-
MD5
1dfe6d227d66658b9ab790ce66160551
-
SHA1
62087a4f6c0b47635f068262b3d9df15aab746d9
-
SHA256
c2d4aff226178355b8ef7b9e28e4d2869def12eacdfe91e9ed1135b6cd20deab
-
SHA512
c10e34658ea727c52f96051fd9fe6d3c1b6f3dbeed9b9ced6bbfd2819db3a8aaeea693f890581190d3d10749e3000f8088c543d8cd006301c0b3032c4457d454
-
SSDEEP
196608:lrkCDFxgtiWe4/RSgOqTn9nBIzuZrSW+xHGoFlaoDKWzQo1OIg5sa7t:5eiYRNXnDZrSF8oF9uB5B
-
Asyncrat family
-
Async RAT payload
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-