General
-
Target
1f522a21b4f7df8d6d4537d2aaba1b407ee427d4e44f89427ad35c3556730843
-
Size
2.9MB
-
Sample
250221-cgqa7azmfs
-
MD5
e2b81e506da924059fd0b1e4bd9eb3ae
-
SHA1
ecf52d7c1616ffa52020ebcc8b3b79ec1770eecd
-
SHA256
1f522a21b4f7df8d6d4537d2aaba1b407ee427d4e44f89427ad35c3556730843
-
SHA512
469358884c44447b34536dfdf75469d196f9aef9ef60a8e8bb4c02756cbb5a67efdcb0b7d241abf83386063b9daee86ba74e993d52f77fa2d20432ed1877f092
-
SSDEEP
49152:IQ3YRorKW5k82cr3YNXrlnKadJSJfT1WCuSeYhVx7wYZIQphenoKHoCPzGnbnr6G:NIRof5kPcDoblLqfTAQ1VxEYDGTICPzk
Static task
static1
Behavioral task
behavioral1
Sample
9491700097082_20250101_20250211_40489.vbs
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
FEB 19
cgkwgawwtvsvxsymd
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/Ax2bm8Nk
Targets
-
-
Target
9491700097082_20250101_20250211_40489.vbs
-
Size
61KB
-
MD5
6b21159837ddee24c19775ca1f5ec62d
-
SHA1
d68d6100363fd75679c69111288d9fa692b35cba
-
SHA256
1bf0f448a3723866f225527bd1cae2d5062ca48c298b425c11968b4bbddca5c8
-
SHA512
2633084c9bf5db0e2f241a33692ce9069ba04fa72c5b8d7cbdb1573f469b039cf1d99836fe21cb5eef0cc7744ecbdb6f1dcdee82c88c851aaa10e5293a8ac023
-
SSDEEP
768:e2ysVepqc8QaEiZ7LfrPBW/2Vbt804sXcYpr6qDaR2UjKWlAi4fKds8kzB6oerlN:m9a5bBvVbu04s5CR2lWiIAwltrQRFY
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-