General

  • Target

    d3c5b85114ae358e3d69402205e331d7f6d5ea0ac7194880ff6c2c1e53386020

  • Size

    74KB

  • Sample

    250330-x3w13sxnw5

  • MD5

    7c8b5e70dced35099317033999a808bc

  • SHA1

    3d224783e33dbb8d9fa9afa694b5f5c7881cbb35

  • SHA256

    d3c5b85114ae358e3d69402205e331d7f6d5ea0ac7194880ff6c2c1e53386020

  • SHA512

    fdd8a1d02a738984592efbd326a412882bba7703d9329f5db2028b47e220d1e1482369ff21a62fef82416bc6d5b9b287cd38aa0d901b44b1ae4ab394397d810f

  • SSDEEP

    1536:JNULkcxVKpC6yPMVFxSFxmJk4I0H1bh/MbQzce7VclN:JNUocxVENyPMVFo+XH1bh+Q3xY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

FEB 26 LOGS

Mutex

ftomnitarzhftqhqf

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/93hjERwM

aes.plain

Targets

    • Target

      d3c5b85114ae358e3d69402205e331d7f6d5ea0ac7194880ff6c2c1e53386020

    • Size

      74KB

    • MD5

      7c8b5e70dced35099317033999a808bc

    • SHA1

      3d224783e33dbb8d9fa9afa694b5f5c7881cbb35

    • SHA256

      d3c5b85114ae358e3d69402205e331d7f6d5ea0ac7194880ff6c2c1e53386020

    • SHA512

      fdd8a1d02a738984592efbd326a412882bba7703d9329f5db2028b47e220d1e1482369ff21a62fef82416bc6d5b9b287cd38aa0d901b44b1ae4ab394397d810f

    • SSDEEP

      1536:JNULkcxVKpC6yPMVFxSFxmJk4I0H1bh/MbQzce7VclN:JNUocxVENyPMVFo+XH1bh+Q3xY

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks