General

  • Target

    COTIZACIN_23-5_Pdf.7z

  • Size

    4KB

  • Sample

    250331-rc5mmstpt6

  • MD5

    1a2e0d01b1a88be24a9450a16127e101

  • SHA1

    eefed23d4e1cf044dc5b2594de4c0bd61bb6189b

  • SHA256

    c8745638f7e73d20f8637b0b64dc8db76ec128acfc62991a5fc57f82369a56d7

  • SHA512

    8d2b497885787c980129db665a5f99fc8a245fed9964f747680b0cf728c6cf12f88c3e979bab1ecb8dc905716eeaea7a4f54dff2248fcaee61240acafe3c17f7

  • SSDEEP

    96:MRcCVQz2VOuaC5oVpp8HPIFO+7eAdzKWz6PS8m:AdVQwOualp8vIFO+RHXh

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://textbin.net/raw/ezjmofz3s6

exe.dropper

https://textbin.net/raw/ezjmofz3s6

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

196.251.89.167:6900

Mutex

vcbkomkyscjsqqkd

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      COTIZACIÓN_23-5_Pdf.vbs

    • Size

      8.5MB

    • MD5

      60ec698e60d2fb823393bc2ee1664742

    • SHA1

      4c632c11036d0eec042d9eddb2b351ae2ed3caf4

    • SHA256

      19b9972f970ca207cf8494582bdf8c68b8a1f9cbbc9a8df0151d05c26cb9b3a1

    • SHA512

      e2e179b5444aa9fab84cb939a4864289bb61a4d2198a07e920eac9de5c1a210771f190b8d7470224007ec4b7d9442b37dfff8d2023258516960b207070c03e6f

    • SSDEEP

      96:5JTmIl/6GLHWtZdJ7AZPFZI6kNl5C+VwX2vR5VU3hOGIAKJV2T45aBSSFfkD:TllyjjdVMFZNkNls2vv8hAJJV8ve

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks