General
-
Target
Venom FUD Crypter.exe
-
Size
33.1MB
-
Sample
250225-ax825ayly5
-
MD5
4d8f0e9b1be60a67a948c0a39963c394
-
SHA1
3fbc962b919806f6fc9022c15638b34eb001ad04
-
SHA256
616835a3491009a64fc5b13a8ab3f41b7c3cb1e438d783e2a8577286d6df9070
-
SHA512
ff6a7867bc9fae22225e5a836366fd0e9cd380d48af06c1bca9527fc3aa4e526e55a1e5b8f83a2ba6ab9a030696cbb9d1b22980ec19a5176d7ede569a2c23e07
-
SSDEEP
786432:qy8V6BYm8YUUWsiDPg50CfZgQukXL5xYU3s0EhHbjxHklu:3NBYEUUWFI5Tf2nEPfEhH/Neu
Malware Config
Extracted
xenorat
domain13.ddns.net
-
delay
5000
-
install_path
temp
-
port
1024
-
startup_name
svchost.exe
Extracted
asyncrat
1.0.7
GitHub
127.0.0.1:10000
127.0.0.1:650
domain13.ddns.net:10000
domain13.ddns.net:650
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
darkvision
https://noratek.helioho.st/upload.php
domain13.ddns.net
Targets
-
-
Target
Venom FUD Crypter.exe
-
Size
33.1MB
-
MD5
4d8f0e9b1be60a67a948c0a39963c394
-
SHA1
3fbc962b919806f6fc9022c15638b34eb001ad04
-
SHA256
616835a3491009a64fc5b13a8ab3f41b7c3cb1e438d783e2a8577286d6df9070
-
SHA512
ff6a7867bc9fae22225e5a836366fd0e9cd380d48af06c1bca9527fc3aa4e526e55a1e5b8f83a2ba6ab9a030696cbb9d1b22980ec19a5176d7ede569a2c23e07
-
SSDEEP
786432:qy8V6BYm8YUUWsiDPg50CfZgQukXL5xYU3s0EhHbjxHklu:3NBYEUUWFI5Tf2nEPfEhH/Neu
-
Asyncrat family
-
Darkvision family
-
Detect XenoRat Payload
-
Xenorat family
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-