General

  • Target

    1880-81-0x0000000000400000-0x0000000000418000-memory.dmp

  • Size

    96KB

  • MD5

    bbb9374ce68629532d87cb507f8900ea

  • SHA1

    7317a0192d2934e67dd82cff7ed394bf32b545cf

  • SHA256

    7411644ff4309a018a3328ec92560309fb7d7e3e6a2e577e9b01d498622f3d14

  • SHA512

    061f4da11be31883be0dda365e57c7a82fd55bed34ebfebb1c1189d05d0b80669bb1a2f661eeee293ada27c22a4318aaecf5062f18768dc8fabea579505a09b6

  • SSDEEP

    1536:1ULkcxVKpC6yPMVKe9VdQuDI6H1bf/hTQzcGLVclN:1UocxVENyPMVKe9VdQsH1bfpTQfBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.1

Botnet

Default

Mutex

vrmctetyuyojxzjvffl

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/WD485ntt

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1880-81-0x0000000000400000-0x0000000000418000-memory.dmp
    .exe windows x86


    Headers

    Sections