General
-
Target
Liberium2.1.exe
-
Size
6.3MB
-
Sample
250329-w1tx9sztg1
-
MD5
ccfdfb92db45d64ac2ef0daf3751f362
-
SHA1
79915d8c61f9f44f2211a269e949dc6aa11c1448
-
SHA256
281ce7db7e9338e11241437e9b4c980506a2dee645438b2f29e395d278b03995
-
SHA512
c4816f347a3aee1b77ddcd31529019458597d9b6d1c297c3bf7ec14bfb9cb25ceaf01469eb2ed3f8bd636e0160da476728a84cf0f5e7ab4d5822809402eff41f
-
SSDEEP
196608:FRofnQF79aM5Gv8+VkY6ID5NwbEWWvXHQoiTIPa:FCQF75S3kY6IKEWWPqN
Static task
static1
Behavioral task
behavioral1
Sample
Liberium2.1.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
1.0.7
GitHub
127.0.0.1:10000
127.0.0.1:650
domain13.ddns.net:10000
domain13.ddns.net:650
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
quasar
1.4.1
GitHub
domain13.ddns.net:650
21b27c61-8944-4615-8ab6-b84be8f39d71
-
encryption_key
845C5D60A275826BC650C718626063CA6657034B
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost.exe
-
subdirectory
java JDK 8
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
mer)/bjvoerf&%cwno
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
-
pastebin_config
https://pastebin.com/raw/q6cqRVgM
Targets
-
-
Target
Liberium2.1.exe
-
Size
6.3MB
-
MD5
ccfdfb92db45d64ac2ef0daf3751f362
-
SHA1
79915d8c61f9f44f2211a269e949dc6aa11c1448
-
SHA256
281ce7db7e9338e11241437e9b4c980506a2dee645438b2f29e395d278b03995
-
SHA512
c4816f347a3aee1b77ddcd31529019458597d9b6d1c297c3bf7ec14bfb9cb25ceaf01469eb2ed3f8bd636e0160da476728a84cf0f5e7ab4d5822809402eff41f
-
SSDEEP
196608:FRofnQF79aM5Gv8+VkY6ID5NwbEWWvXHQoiTIPa:FCQF75S3kY6IKEWWPqN
-
Asyncrat family
-
Quasar family
-
Quasar payload
-
Venomrat family
-
Async RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1