Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1DHL-INVOIC...09.vbs
windows7-x64
8DHL-INVOIC...09.vbs
windows10-2004-x64
10Damage product 1.vbs
windows7-x64
8Damage product 1.vbs
windows10-2004-x64
10Damage product 2.vbs
windows7-x64
8Damage product 2.vbs
windows10-2004-x64
10Damage product 3.vbs
windows7-x64
8Damage product 3.vbs
windows10-2004-x64
10General
-
Target
0d5673f533f07a31d3942d8430f717eee529ac7476b855edb4b3ef793eb8d283
-
Size
1.8MB
-
Sample
250307-gbmqbsvvbz
-
MD5
225a7d69c0886a3795a54273bb15e9ba
-
SHA1
fbe30a8c335a024ae9610e4247794d4556a7e4b2
-
SHA256
0d5673f533f07a31d3942d8430f717eee529ac7476b855edb4b3ef793eb8d283
-
SHA512
92aba58f21f0a03011eb44d4a0fef399bf2aa9cbf5ab4b80b9726fe73616f506d809b59e53b59f295383136a738dc0a011bbc83b64fd334df479d6f844d281fe
-
SSDEEP
24576:0JyVC+EDSGigY2B7FbeiC59HFeeeqPmTMLC9la5mPCg5XEwDCL36hEANDISl8UJu:+SGio3eiC55FWMROC7wDCORZdJt0ulu
Static task
static1
Behavioral task
behavioral1
Sample
DHL-INVOICE_10094519030720250009.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DHL-INVOICE_10094519030720250009.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Damage product 1.vbs
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Damage product 1.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Damage product 2.vbs
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Damage product 2.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Damage product 3.vbs
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
FEB 27 LOGS
dwjsrlleihmlidl
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/i3NzmwEg
Targets
-
-
Target
DHL-INVOICE_10094519030720250009.vbs
-
Size
98KB
-
MD5
540e4bf8702b547df9e3868c10ac3af5
-
SHA1
e0e0ff304f3b373b285dc405f3eb44f03c2b989e
-
SHA256
de17c28e65d85e092109368925d9e27f51cb79c01cf4526011cfec863462e1af
-
SHA512
cbba98c3aa544380167e1a39d6232187c215a2432009666ad04db0d4fccba6c5f3dfc8d797b9916ab0fb4dcad149e54b899d00eb1268e99d442c34ce6e9d54a6
-
SSDEEP
3072:SMEJk61R5X/jMrkaQlPYvEIX3eUfiRwle2TfjH:p8/RaQ9wrXuUfi2TfjH
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
Damage product 1.vbs
-
Size
98KB
-
MD5
540e4bf8702b547df9e3868c10ac3af5
-
SHA1
e0e0ff304f3b373b285dc405f3eb44f03c2b989e
-
SHA256
de17c28e65d85e092109368925d9e27f51cb79c01cf4526011cfec863462e1af
-
SHA512
cbba98c3aa544380167e1a39d6232187c215a2432009666ad04db0d4fccba6c5f3dfc8d797b9916ab0fb4dcad149e54b899d00eb1268e99d442c34ce6e9d54a6
-
SSDEEP
3072:SMEJk61R5X/jMrkaQlPYvEIX3eUfiRwle2TfjH:p8/RaQ9wrXuUfi2TfjH
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
Damage product 2.vbs
-
Size
98KB
-
MD5
540e4bf8702b547df9e3868c10ac3af5
-
SHA1
e0e0ff304f3b373b285dc405f3eb44f03c2b989e
-
SHA256
de17c28e65d85e092109368925d9e27f51cb79c01cf4526011cfec863462e1af
-
SHA512
cbba98c3aa544380167e1a39d6232187c215a2432009666ad04db0d4fccba6c5f3dfc8d797b9916ab0fb4dcad149e54b899d00eb1268e99d442c34ce6e9d54a6
-
SSDEEP
3072:SMEJk61R5X/jMrkaQlPYvEIX3eUfiRwle2TfjH:p8/RaQ9wrXuUfi2TfjH
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
Damage product 3.vbs
-
Size
98KB
-
MD5
540e4bf8702b547df9e3868c10ac3af5
-
SHA1
e0e0ff304f3b373b285dc405f3eb44f03c2b989e
-
SHA256
de17c28e65d85e092109368925d9e27f51cb79c01cf4526011cfec863462e1af
-
SHA512
cbba98c3aa544380167e1a39d6232187c215a2432009666ad04db0d4fccba6c5f3dfc8d797b9916ab0fb4dcad149e54b899d00eb1268e99d442c34ce6e9d54a6
-
SSDEEP
3072:SMEJk61R5X/jMrkaQlPYvEIX3eUfiRwle2TfjH:p8/RaQ9wrXuUfi2TfjH
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-