General
-
Target
Venom Rat 6.0.3.7z
-
Size
73.9MB
-
Sample
250127-29nqhayngz
-
MD5
521bfb8702853d807e0b7bffba132a97
-
SHA1
b3f39f1a22e2ebc5bdd4085c9f9a8f887ab9813e
-
SHA256
cde9c5a301e15dd10db1a9747fc95004b793c538f2ff4f9c05e52955b666b564
-
SHA512
23ce1c46f049c4c9d197f137c05fbc80466a4f34361cb60990708f6701dcc19971b1520e898646a85e6638830d5e8fcfedc63ea123fafcd029e3ad2be6a00fe6
-
SSDEEP
1572864:uVI5gzIBQ4OZRbwhtqmF8o4hdboY/y6/twvY17cI19ffUq:4IeIa4Atotq7hJoY/p/x17T9HUq
Behavioral task
behavioral1
Sample
Client.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Venom RAT + HVNC + Stealer + Grabber.exe
Resource
win11-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
95.216.52.21:7575
xdnqiaxygefjfoolgo
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
jqftepbovsiy
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Client.exe
-
Size
66KB
-
MD5
3935ef8202cd8040741138a14b0655f0
-
SHA1
54cf02cf472111b57ac5329a408b2f858e2f3b86
-
SHA256
3a7efdc3d85adf7a5484ef17549db47be2a78b4b6892d93dd91958bb9a9edb82
-
SHA512
cbc24bde07ec9d1372869ce697ba3fcc76a7be2b75122af1f283160551dfc2dd18f77bc24ed0fff37b49dc7c8b0ffd41001f238595bec0c4761a5f4a79ec5ff1
-
SSDEEP
1536:0vWMO7xoQlzh4fZF9O8QQHFkYlTwVsbbXA/a2s9TDZVclN:HoR9O8QQHFk1sbbXh2sNzY
-
Asyncrat family
-
-
-
Target
Venom RAT + HVNC + Stealer + Grabber.exe
-
Size
14.2MB
-
MD5
3b3a304c6fc7a3a1d9390d7cbff56634
-
SHA1
e8bd5244e6362968f5017680da33f1e90ae63dd7
-
SHA256
7331368c01b2a16bda0f013f376a039e6aeb4cb2dd8b0c2afc7ca208fb544c58
-
SHA512
7f1beacb6449b3b3e108016c8264bb9a21ecba526c2778794f16a7f9c817c0bbd5d4cf0c208d706d25c54322a875da899ab047aab1e07684f6b7b6083981abe5
-
SSDEEP
196608:Nja6chUZX81lbFklbYJygrP7aIBhLkNPFCZZwiJl1NLIsPA8fxvuIMzd/95UhS14:qT+P+Zw6NLIsFfskh1BmXG04
-
Asyncrat family
-
Modifies Windows Defender Real-time Protection settings
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
2Windows Service
2