General
-
Target
f5f107be259fa9f45092665ed2c4e11183d3a64c484b0d0ea4675c85f6eae87e
-
Size
3.4MB
-
Sample
250329-ymbkwaxsdt
-
MD5
3761617c93f8dbe25b4dd01064d12a59
-
SHA1
0ae8278cc4a94c95db2a17f9dcf31a358e2601b2
-
SHA256
f5f107be259fa9f45092665ed2c4e11183d3a64c484b0d0ea4675c85f6eae87e
-
SHA512
163896e7841f3f4a3db0b432b7af270b2a8642ddd2857d8e44509a55a4fd2f5b7522d2f7084c92c209da375096476f86a1b770e129c528421658725f6bfaa3b6
-
SSDEEP
98304:x7Cz7SPhCNQl2ZolSQYwLjyy4fub0/rmPXqGR4YyN:xwMCNQeol+w/yy4fug/edny
Behavioral task
behavioral1
Sample
f5f107be259fa9f45092665ed2c4e11183d3a64c484b0d0ea4675c85f6eae87e.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
test5
92.213.96.141:3389
vmtestingdrei
-
delay
11
-
install
true
-
install_file
COM Surrogate.exe
-
install_folder
%AppData%
Targets
-
-
Target
f5f107be259fa9f45092665ed2c4e11183d3a64c484b0d0ea4675c85f6eae87e
-
Size
3.4MB
-
MD5
3761617c93f8dbe25b4dd01064d12a59
-
SHA1
0ae8278cc4a94c95db2a17f9dcf31a358e2601b2
-
SHA256
f5f107be259fa9f45092665ed2c4e11183d3a64c484b0d0ea4675c85f6eae87e
-
SHA512
163896e7841f3f4a3db0b432b7af270b2a8642ddd2857d8e44509a55a4fd2f5b7522d2f7084c92c209da375096476f86a1b770e129c528421658725f6bfaa3b6
-
SSDEEP
98304:x7Cz7SPhCNQl2ZolSQYwLjyy4fub0/rmPXqGR4YyN:xwMCNQeol+w/yy4fug/edny
-
Asyncrat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-