General
-
Target
lmfao.bat
-
Size
330B
-
Sample
250124-vgpzjayjev
-
MD5
ddba1745786f39ba4ae9198510aea429
-
SHA1
71f4136708be24a03401e2afdf72fb968be3ab9b
-
SHA256
f1db00b7e0d7875ad7b2c4c39e9902f68b17d5326697b3a49b640fd95753f7a3
-
SHA512
507359003cc75b17a74a444505b8e2378664e35ca7e6b605564ec000250c5855d296b0d1dae724047a678b5a6236a9923af0f3f9b9395957aa1969b1fdda71eb
Static task
static1
Behavioral task
behavioral1
Sample
lmfao.bat
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
195.88.218.126:2404
rtyjmmoinnphou
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
lmfao.bat
-
Size
330B
-
MD5
ddba1745786f39ba4ae9198510aea429
-
SHA1
71f4136708be24a03401e2afdf72fb968be3ab9b
-
SHA256
f1db00b7e0d7875ad7b2c4c39e9902f68b17d5326697b3a49b640fd95753f7a3
-
SHA512
507359003cc75b17a74a444505b8e2378664e35ca7e6b605564ec000250c5855d296b0d1dae724047a678b5a6236a9923af0f3f9b9395957aa1969b1fdda71eb
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-