General

  • Target

    EXMSettingsRestoreUtility.exe

  • Size

    122KB

  • Sample

    250207-d1qxhaxkct

  • MD5

    15f043fb9ac824a896d33502ce43a501

  • SHA1

    e8b8ff0633441603405bf83e57bafa385ca0e784

  • SHA256

    59131a7e8725c4de5a4e1fe5e3febf9f861c22f58ad0cb179bf4d2f419613abf

  • SHA512

    7e9756b1694be946d460d37188e9d193f3e128abe692ca770ef6893f8979800b017b23d4d4a42d6fa546bf12c5f495b3cb6e2fa866e1b805b8a997f50b46d1b9

  • SSDEEP

    3072:Um8Y3AavY9QonIV6fAaCTgDEZ9DAxpz6+l5nlKv0Mp5:U23tvYaeIk5CTgDEZBMuw5nlKvnp

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

193.161.193.99:304480

Mutex

nigger93

Attributes
  • delay

    1

  • install

    true

  • install_file

    nigger93.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      EXMSettingsRestoreUtility.exe

    • Size

      122KB

    • MD5

      15f043fb9ac824a896d33502ce43a501

    • SHA1

      e8b8ff0633441603405bf83e57bafa385ca0e784

    • SHA256

      59131a7e8725c4de5a4e1fe5e3febf9f861c22f58ad0cb179bf4d2f419613abf

    • SHA512

      7e9756b1694be946d460d37188e9d193f3e128abe692ca770ef6893f8979800b017b23d4d4a42d6fa546bf12c5f495b3cb6e2fa866e1b805b8a997f50b46d1b9

    • SSDEEP

      3072:Um8Y3AavY9QonIV6fAaCTgDEZ9DAxpz6+l5nlKv0Mp5:U23tvYaeIk5CTgDEZBMuw5nlKvnp

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks