General
-
Target
Client.bat
-
Size
88KB
-
Sample
240630-zn837svfmh
-
MD5
a926f9d53905b37d2302f26c0b7b8513
-
SHA1
c2ac13e22da81f41c8afa10caa97587c9b0c7955
-
SHA256
54827271adc73e03abc8a39360562129bf55d8ad54c8cbd529457f2a1846fbd7
-
SHA512
2914b2b06eaed7a2731b6582cab7b07b2fd885c325b7d8f2a1e286eaa9a495ff169ee17868814ba673f204cfb0e636f550b02f0ae217ac3080abdfcecf007898
-
SSDEEP
1536:c4V/BQ3BS857j2ZBDyXNDCnxQ7W/ZMlFogoetTDwq7leA91Z2jpPkuxmNMpePN3w:xBQ4WpCnTZObPDwqFde3JWNA
Static task
static1
Behavioral task
behavioral1
Sample
Client.bat
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Client.bat
Resource
win10v2004-20240611-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
94.156.79.107:4443
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Client.bat
-
Size
88KB
-
MD5
a926f9d53905b37d2302f26c0b7b8513
-
SHA1
c2ac13e22da81f41c8afa10caa97587c9b0c7955
-
SHA256
54827271adc73e03abc8a39360562129bf55d8ad54c8cbd529457f2a1846fbd7
-
SHA512
2914b2b06eaed7a2731b6582cab7b07b2fd885c325b7d8f2a1e286eaa9a495ff169ee17868814ba673f204cfb0e636f550b02f0ae217ac3080abdfcecf007898
-
SSDEEP
1536:c4V/BQ3BS857j2ZBDyXNDCnxQ7W/ZMlFogoetTDwq7leA91Z2jpPkuxmNMpePN3w:xBQ4WpCnTZObPDwqFde3JWNA
Score10/10-
Async RAT payload
-
Blocklisted process makes network request
-