General

  • Target

    SEx.exe

  • Size

    63KB

  • MD5

    3ad3df2a2855599603ef72cddba7621d

  • SHA1

    2cdfbf36623d37baab382995035094d2f40d1c31

  • SHA256

    0c3e39231c15cc95f0c39ce9376d6ae58107f84f4a0f92ee8e3662eac4d5b457

  • SHA512

    c9cdada95aaccf42e13ca8fa2fb4fe7ba3a1c0039630883c4e958fbc9df488d552bc68353f97e568c587ba761f62a9f0d8a0b424286e306bf5c9ee0004e6301c

  • SSDEEP

    1536:AhIBLTM3Ufc0cMd7e5Q5Os4GbbUwBsFGGDpqKmY7:AhIBLTM3Ufc6da5QqGbbUgsRgz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

127.0.0.1:4449

127.0.0.1:80

181.162.213.36:4449

181.162.213.36:80

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family

Files

  • SEx.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections