General

  • Target

    924-79-0x0000000000400000-0x0000000000418000-memory.dmp

  • Size

    96KB

  • MD5

    6dc9aaeed5233c3adeac24a991afec8f

  • SHA1

    805867a6e2bcb008fd434f43ff124b70a333f2c8

  • SHA256

    ea3c79bfa8189c9888e14ca80e602be397ad7d78d9c6bd5a82b2ed2971c3f4b2

  • SHA512

    e4c67dade3ca3b0b7ebca791ffc5e272b6b9a87f0776d88bd204688da63dc9007bf443c3c8cc0407643deac2fa047fdb43daf495ce4ebc6dd2962c6a8c1564b3

  • SSDEEP

    1536:EUEkcx4VHsC0SPMV7e9VdQuDI6H1bf/EtEZ23UQzc2LVclN:EUxcx4GfSPMV7e9VdQsH1bfMCokQPBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.1

Botnet

Default

C2

151.80.52.38:4449

Mutex

ctbrvrbjbpdrrmujx

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 924-79-0x0000000000400000-0x0000000000418000-memory.dmp
    .exe windows x86


    Headers

    Sections