General

  • Target

    f5f107be259fa9f45092665ed2c4e11183d3a64c484b0d0ea4675c85f6eae87e

  • Size

    3.4MB

  • Sample

    250329-ymbkwaxsdt

  • MD5

    3761617c93f8dbe25b4dd01064d12a59

  • SHA1

    0ae8278cc4a94c95db2a17f9dcf31a358e2601b2

  • SHA256

    f5f107be259fa9f45092665ed2c4e11183d3a64c484b0d0ea4675c85f6eae87e

  • SHA512

    163896e7841f3f4a3db0b432b7af270b2a8642ddd2857d8e44509a55a4fd2f5b7522d2f7084c92c209da375096476f86a1b770e129c528421658725f6bfaa3b6

  • SSDEEP

    98304:x7Cz7SPhCNQl2ZolSQYwLjyy4fub0/rmPXqGR4YyN:xwMCNQeol+w/yy4fug/edny

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

test5

C2

92.213.96.141:3389

Mutex

vmtestingdrei

Attributes
  • delay

    11

  • install

    true

  • install_file

    COM Surrogate.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      f5f107be259fa9f45092665ed2c4e11183d3a64c484b0d0ea4675c85f6eae87e

    • Size

      3.4MB

    • MD5

      3761617c93f8dbe25b4dd01064d12a59

    • SHA1

      0ae8278cc4a94c95db2a17f9dcf31a358e2601b2

    • SHA256

      f5f107be259fa9f45092665ed2c4e11183d3a64c484b0d0ea4675c85f6eae87e

    • SHA512

      163896e7841f3f4a3db0b432b7af270b2a8642ddd2857d8e44509a55a4fd2f5b7522d2f7084c92c209da375096476f86a1b770e129c528421658725f6bfaa3b6

    • SSDEEP

      98304:x7Cz7SPhCNQl2ZolSQYwLjyy4fub0/rmPXqGR4YyN:xwMCNQeol+w/yy4fug/edny

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks