General
-
Target
Azes.exe
-
Size
74KB
-
Sample
250220-rttlpsxjem
-
MD5
2efdc3e7030e196c7eadda0d979d8274
-
SHA1
2c8c87c8dbcdd3dc998728a8d2f22443790349a4
-
SHA256
af15b9bcd00a2123879e6548b64abb1a6b5a6b4a0fd025a59cd5515ff0d4e44e
-
SHA512
5cd6d342e4336a60b867f5f6b580cf158e66f49cb920170612feb147e93f2fb13881c692c48d34f0b58a1a964600663c085360e88f8a22162b3ae3a617164c24
-
SSDEEP
1536:ZUN8cxqnHXC56PMVBxgUwj8IdH1bT/qIpu6nQzcQxLVclN:ZUucxq3O6PMVBxgPH1bT/puiQlxBY
Behavioral task
behavioral1
Sample
Azes.exe
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
iziypsepddgqzkru
-
delay
3
-
install
true
-
install_file
klmpDrive.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/XefSsmpN
Targets
-
-
Target
Azes.exe
-
Size
74KB
-
MD5
2efdc3e7030e196c7eadda0d979d8274
-
SHA1
2c8c87c8dbcdd3dc998728a8d2f22443790349a4
-
SHA256
af15b9bcd00a2123879e6548b64abb1a6b5a6b4a0fd025a59cd5515ff0d4e44e
-
SHA512
5cd6d342e4336a60b867f5f6b580cf158e66f49cb920170612feb147e93f2fb13881c692c48d34f0b58a1a964600663c085360e88f8a22162b3ae3a617164c24
-
SSDEEP
1536:ZUN8cxqnHXC56PMVBxgUwj8IdH1bT/qIpu6nQzcQxLVclN:ZUucxq3O6PMVBxgPH1bT/puiQlxBY
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-