General
-
Target
b2d86cc7f95fe1a49b60e658233d46a5fb5c31e73509d4514339f1326c6c25a1
-
Size
1.9MB
-
Sample
250217-qjvkkszqw8
-
MD5
419224217f8d418e6338c1d3a9c09d38
-
SHA1
184aa4423893efd31d95c070708d6a164f6d7b88
-
SHA256
b2d86cc7f95fe1a49b60e658233d46a5fb5c31e73509d4514339f1326c6c25a1
-
SHA512
b28fd06f8c6f36467df289327cb13ac72c0cfc49056a9d4aa27acebdb4fcd2e13b1b1c08bcd6dafd95f55b6a1a81cf0e60128baf7731485017f10e676677fcdf
-
SSDEEP
49152:oXTeci9Sb2nMUVyUxQ2XBzCmWqXBAseBBLH2vSIClDL5z7IVqV/N:KTec9UT3BOpqXOhBdIiDL5z7IVqz
Static task
static1
Behavioral task
behavioral1
Sample
9491700097082_20250101_20250211_40488.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
9491700097082_20250101_20250211_40488.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
FEB LOGS
khylkawaoxlgbn
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/93hjERwM
Targets
-
-
Target
9491700097082_20250101_20250211_40488.exe
-
Size
2.2MB
-
MD5
49add13cd25be4eaae2fe42f13acbfbc
-
SHA1
8133cfe75cffe4c85bede6de702d2b1b9a919ce3
-
SHA256
2f0754941c7ff797a14205c649e4a24c1b859baa73d310b9faf11a90695827a9
-
SHA512
cfdac63e9e4be9175ee0936d5bfb61c8246c09ebf7f7a8291fb9417be6243daa766c380ea5705e54a49e6aedef81197d2a694f6c55ff3b99b9012650206e8852
-
SSDEEP
49152:huMhsk1KxsKpilkjOmSMK4nXOrie9ZhGrxnVThU1bYBif3U:Rhs1iBuOm9XOrJox5m1sBi/U
-
Asyncrat family
-
Modifies WinLogon for persistence
-
Venomrat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-