General
-
Target
adbce5e454bbc8b27c4ac87f70dee8d622395b541736d6f0af027dd94e454cb7
-
Size
74KB
-
Sample
250328-bfbwqssmt9
-
MD5
85f89a5f5806117cc82aec6e1f89cd13
-
SHA1
735d2331d6bc90498f3f1405af0dffa37b136e5d
-
SHA256
adbce5e454bbc8b27c4ac87f70dee8d622395b541736d6f0af027dd94e454cb7
-
SHA512
038c96c575f0a1204a4159cd7ac9262f7e1447be9bba28278ddcdd6294280f40399cfb06a89e40460114306c9b5a33d466ac2de7af58575b80cad0921f4a979d
-
SSDEEP
1536:WUqkcx5v/5CxSPMVBAMv/IjH1bOx+TYKiAQzcjRVclN:WUDcx5vx2SPMVBAMvyH1bO882Qm7Y
Behavioral task
behavioral1
Sample
adbce5e454bbc8b27c4ac87f70dee8d622395b541736d6f0af027dd94e454cb7.exe
Resource
win7-20241023-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
EulenV4
chxtzuezuve
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/KnhCGRrn
Targets
-
-
Target
adbce5e454bbc8b27c4ac87f70dee8d622395b541736d6f0af027dd94e454cb7
-
Size
74KB
-
MD5
85f89a5f5806117cc82aec6e1f89cd13
-
SHA1
735d2331d6bc90498f3f1405af0dffa37b136e5d
-
SHA256
adbce5e454bbc8b27c4ac87f70dee8d622395b541736d6f0af027dd94e454cb7
-
SHA512
038c96c575f0a1204a4159cd7ac9262f7e1447be9bba28278ddcdd6294280f40399cfb06a89e40460114306c9b5a33d466ac2de7af58575b80cad0921f4a979d
-
SSDEEP
1536:WUqkcx5v/5CxSPMVBAMv/IjH1bOx+TYKiAQzcjRVclN:WUDcx5vx2SPMVBAMvyH1bO882Qm7Y
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Venomrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-