General
-
Target
20022025_1553_9491700097082_20250101_20250211_40489.vbs
-
Size
59KB
-
Sample
250220-tffh2azmz7
-
MD5
ed21073856c03d1b0c3690cdc3acae54
-
SHA1
7080a7970f39ebc0928fd1563a39894c1b0b9daa
-
SHA256
8d8048f2936aa8f30891ba0bb4d6710aa4a13c4795122154d2fc5dad85c366d5
-
SHA512
c4948f3039ce07ba5e88eef975c3a3718f13acd2fa49472e0f99aebb2154babc26001391b715043b1670a0eb82a1ebfcee3d0b4ac515e8e1e7000bc51814cec5
-
SSDEEP
768:cMqKvuBXF44i4wbTHDudi0NCefDOZaBZamnDyKp09WB5zMwIZ8ltcYTw2j7ZguRM:wFuqdfDOkbH7FIZySYtj1guT7pvjI
Static task
static1
Behavioral task
behavioral1
Sample
20022025_1553_9491700097082_20250101_20250211_40489.vbs
Resource
win7-20241023-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
FEB 19
cgkwgawwtvsvxsymd
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/Ax2bm8Nk
Targets
-
-
Target
20022025_1553_9491700097082_20250101_20250211_40489.vbs
-
Size
59KB
-
MD5
ed21073856c03d1b0c3690cdc3acae54
-
SHA1
7080a7970f39ebc0928fd1563a39894c1b0b9daa
-
SHA256
8d8048f2936aa8f30891ba0bb4d6710aa4a13c4795122154d2fc5dad85c366d5
-
SHA512
c4948f3039ce07ba5e88eef975c3a3718f13acd2fa49472e0f99aebb2154babc26001391b715043b1670a0eb82a1ebfcee3d0b4ac515e8e1e7000bc51814cec5
-
SSDEEP
768:cMqKvuBXF44i4wbTHDudi0NCefDOZaBZamnDyKp09WB5zMwIZ8ltcYTw2j7ZguRM:wFuqdfDOkbH7FIZySYtj1guT7pvjI
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-