General
-
Target
COTIZACIÓN.vbs
-
Size
8.5MB
-
Sample
250331-v2lslsxjt4
-
MD5
804513fa0ce051329e04056cdcd334bf
-
SHA1
107e788694216d64c5c02990f035f1d1acb60cf9
-
SHA256
17dd3793d4bbf9e90e53df26678489a7b82e65d1eeecf396eb088b444a164f85
-
SHA512
83aa0132a7fb8f2029c84fd329a2ff9179e646048e8a5997b1978dec2f29583c5f23808f6eb22be618744d21cd5d5f589f30d4e47d302484597ca960f2379f16
-
SSDEEP
192:DloyjjdVMFZNkNls2vv8hAwxJV837YTUf:lxO7k0hAwHVk
Static task
static1
Behavioral task
behavioral1
Sample
COTIZACIÓN.vbs
Resource
win10v2004-20250314-en
Malware Config
Extracted
https://textbin.net/raw/ezjmofz3s6
https://textbin.net/raw/ezjmofz3s6
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
196.251.89.167:6900
vcbkomkyscjsqqkd
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
COTIZACIÓN.vbs
-
Size
8.5MB
-
MD5
804513fa0ce051329e04056cdcd334bf
-
SHA1
107e788694216d64c5c02990f035f1d1acb60cf9
-
SHA256
17dd3793d4bbf9e90e53df26678489a7b82e65d1eeecf396eb088b444a164f85
-
SHA512
83aa0132a7fb8f2029c84fd329a2ff9179e646048e8a5997b1978dec2f29583c5f23808f6eb22be618744d21cd5d5f589f30d4e47d302484597ca960f2379f16
-
SSDEEP
192:DloyjjdVMFZNkNls2vv8hAwxJV837YTUf:lxO7k0hAwHVk
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1