General
-
Target
ohiforgot.exe
-
Size
74KB
-
Sample
250421-xh61jsvqw7
-
MD5
e061a0b37973b6466a192f1d18fd513b
-
SHA1
f884c6c06ef6109aa737ac9b67c7c11b73294e4a
-
SHA256
49e718675e880dc00de6fff1466604de8df962207861a54c83ff99a070512d31
-
SHA512
90dde439124f2db089ce0d0b88da3319d083ff90b84a6f7309a9b19e77873b8ddc37a5621307dc4f910511cbcdc4a85c238024c39ca811c510e76d29086046ae
-
SSDEEP
1536:2UaUcxoyR1CriPMV8H2sICH1bX/VskQzcaLVclN:2UDcxoyXkiPMV62IH1bXukQLBY
Behavioral task
behavioral1
Sample
ohiforgot.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:8848
81.109.5.62:4449
81.109.5.62:8848
fxgikqpbfkxg
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
ohiforgot.exe
-
Size
74KB
-
MD5
e061a0b37973b6466a192f1d18fd513b
-
SHA1
f884c6c06ef6109aa737ac9b67c7c11b73294e4a
-
SHA256
49e718675e880dc00de6fff1466604de8df962207861a54c83ff99a070512d31
-
SHA512
90dde439124f2db089ce0d0b88da3319d083ff90b84a6f7309a9b19e77873b8ddc37a5621307dc4f910511cbcdc4a85c238024c39ca811c510e76d29086046ae
-
SSDEEP
1536:2UaUcxoyR1CriPMV8H2sICH1bX/VskQzcaLVclN:2UDcxoyXkiPMV62IH1bXukQLBY
-
Asyncrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-