General

  • Target

    rzsneo_xp2k.exe

  • Size

    2.7MB

  • Sample

    250303-v7z77atyaw

  • MD5

    d8a38fb9a5c0295825c0b4d46f32324c

  • SHA1

    f3e32410b83e93ecbcbd829a4bd0a360c7449cea

  • SHA256

    3f539cd170926f163d3edd57e673097a83d5bced26009b62ba32af5a36da2b60

  • SHA512

    5d9fbc3f8ddd691d7af764274bc41f490dc088b0409beb0fcb8cbec21c026b0ad3c3af93aab8be5dfcefd4602cd68b22efcd1e8abac2ce3e3f447ec0847d4ab0

  • SSDEEP

    49152:tyMJcNGc6/FPnVtlR785IGBKqQiNUeblQPw3QOcmWb7vAGfJ9tJBoaI3Hzz45uJ:gYcN9sltRqRUebmEhgZDpI3n5

Malware Config

Targets

    • Target

      rzsneo_xp2k.exe

    • Size

      2.7MB

    • MD5

      d8a38fb9a5c0295825c0b4d46f32324c

    • SHA1

      f3e32410b83e93ecbcbd829a4bd0a360c7449cea

    • SHA256

      3f539cd170926f163d3edd57e673097a83d5bced26009b62ba32af5a36da2b60

    • SHA512

      5d9fbc3f8ddd691d7af764274bc41f490dc088b0409beb0fcb8cbec21c026b0ad3c3af93aab8be5dfcefd4602cd68b22efcd1e8abac2ce3e3f447ec0847d4ab0

    • SSDEEP

      49152:tyMJcNGc6/FPnVtlR785IGBKqQiNUeblQPw3QOcmWb7vAGfJ9tJBoaI3Hzz45uJ:gYcN9sltRqRUebmEhgZDpI3n5

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks