General
-
Target
477f89cc7690210c0e3f3cee9f562708092b3770539367555ecd2b84b2699a96
-
Size
7.5MB
-
Sample
250330-x51gaavxew
-
MD5
947eabafe59955146fdb714a09e74896
-
SHA1
a229cea1a129676f7b7c3c7bc80a28e9c22268aa
-
SHA256
477f89cc7690210c0e3f3cee9f562708092b3770539367555ecd2b84b2699a96
-
SHA512
814a1ed776ae4dbff873cb61e72cad9b71fd8f813e38b203b7a68f351627685320aadaccfee160d2faa2f2867c492ce2428d0331aebfed6eacdc950b618a1e98
-
SSDEEP
196608:TOIe9o8SdDSPvb9FLZmFZKPzs+l8By5k4SFn0r:yHm8Sd0FNm+bs2C4yn0r
Static task
static1
Behavioral task
behavioral1
Sample
477f89cc7690210c0e3f3cee9f562708092b3770539367555ecd2b84b2699a96.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
477f89cc7690210c0e3f3cee9f562708092b3770539367555ecd2b84b2699a96.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
178.117.80.225:3998
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
477f89cc7690210c0e3f3cee9f562708092b3770539367555ecd2b84b2699a96
-
Size
7.5MB
-
MD5
947eabafe59955146fdb714a09e74896
-
SHA1
a229cea1a129676f7b7c3c7bc80a28e9c22268aa
-
SHA256
477f89cc7690210c0e3f3cee9f562708092b3770539367555ecd2b84b2699a96
-
SHA512
814a1ed776ae4dbff873cb61e72cad9b71fd8f813e38b203b7a68f351627685320aadaccfee160d2faa2f2867c492ce2428d0331aebfed6eacdc950b618a1e98
-
SSDEEP
196608:TOIe9o8SdDSPvb9FLZmFZKPzs+l8By5k4SFn0r:yHm8Sd0FNm+bs2C4yn0r
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-