General

  • Target

    DemonSpoofCall.exe

  • Size

    9.7MB

  • Sample

    250122-wvnjaszjep

  • MD5

    1dfe6d227d66658b9ab790ce66160551

  • SHA1

    62087a4f6c0b47635f068262b3d9df15aab746d9

  • SHA256

    c2d4aff226178355b8ef7b9e28e4d2869def12eacdfe91e9ed1135b6cd20deab

  • SHA512

    c10e34658ea727c52f96051fd9fe6d3c1b6f3dbeed9b9ced6bbfd2819db3a8aaeea693f890581190d3d10749e3000f8088c543d8cd006301c0b3032c4457d454

  • SSDEEP

    196608:lrkCDFxgtiWe4/RSgOqTn9nBIzuZrSW+xHGoFlaoDKWzQo1OIg5sa7t:5eiYRNXnDZrSF8oF9uB5B

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:6606

89.84.63.139:6606

Mutex

caqxyzoxvrzhnrxwoc

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      DemonSpoofCall.exe

    • Size

      9.7MB

    • MD5

      1dfe6d227d66658b9ab790ce66160551

    • SHA1

      62087a4f6c0b47635f068262b3d9df15aab746d9

    • SHA256

      c2d4aff226178355b8ef7b9e28e4d2869def12eacdfe91e9ed1135b6cd20deab

    • SHA512

      c10e34658ea727c52f96051fd9fe6d3c1b6f3dbeed9b9ced6bbfd2819db3a8aaeea693f890581190d3d10749e3000f8088c543d8cd006301c0b3032c4457d454

    • SSDEEP

      196608:lrkCDFxgtiWe4/RSgOqTn9nBIzuZrSW+xHGoFlaoDKWzQo1OIg5sa7t:5eiYRNXnDZrSF8oF9uB5B

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks