General

  • Target

    1596-64-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • Sample

    221205-tzarwsfg63

  • MD5

    2c8f00fca82af744977b1b9578e88fec

  • SHA1

    333c4fdff9bcd18ea50230cdb1c02bdb0f55a433

  • SHA256

    618a775e6f291683c57698a9b7128b8d3a3e38d1b5be116ccdc97eeeb1669f6c

  • SHA512

    379b21552b5ed87643d5817549d8e4d72f8e1be570230ba44982820bb26429d3b5d2c10174f8f9236dce40e85cd562685ed83064542f80275cbb70287ea44f2b

  • SSDEEP

    768:qm/Bk4tnSRVBh8ZPQIheLqdK0/eztvp5kF3JIpzz3vNlTVV2NvODmqbzIqpf51od:qZ4CtYZA3VlTYKbbzfzaUlfFXUXOA

Malware Config

Extracted

Family

asyncrat

Version

VenomRAT+HVNC+Stealer Version:5.0.8

Botnet

Venom Clients

C2

79.137.207.151:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT066840

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1596-64-0x0000000000400000-0x0000000000416000-memory.dmp

    • Size

      88KB

    • MD5

      2c8f00fca82af744977b1b9578e88fec

    • SHA1

      333c4fdff9bcd18ea50230cdb1c02bdb0f55a433

    • SHA256

      618a775e6f291683c57698a9b7128b8d3a3e38d1b5be116ccdc97eeeb1669f6c

    • SHA512

      379b21552b5ed87643d5817549d8e4d72f8e1be570230ba44982820bb26429d3b5d2c10174f8f9236dce40e85cd562685ed83064542f80275cbb70287ea44f2b

    • SSDEEP

      768:qm/Bk4tnSRVBh8ZPQIheLqdK0/eztvp5kF3JIpzz3vNlTVV2NvODmqbzIqpf51od:qZ4CtYZA3VlTYKbbzfzaUlfFXUXOA

    Score
    1/10

MITRE ATT&CK Matrix

Tasks