General

  • Target

    1960-56-0x0000000000400000-0x000000000041C000-memory.dmp

  • Size

    112KB

  • MD5

    f31ac10373d5566ed4d0cffaec769ade

  • SHA1

    4018cacab0727f682ec8e49eca66d37365f63168

  • SHA256

    0395a0e1db6f489e11fb5a9b01544b8b4428a7dbbbbf261ef370ee2ca801c541

  • SHA512

    ad0cd1bdce3f4b6134b4d5e046a83e2f755f54160566b5254a8d94d4f2ec9dc2106320e2335bbb84c5dcb07920c46bd1e982eb54994250bd352b42677e7941a4

  • SSDEEP

    1536:mUGngcxGtEXCrWPMV15raKIjH1bx/cZMFiQzcELVclN:mUGgcxGtkQWPMVzranH1bxUOQQZBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.1

Botnet

O365

C2

111.90.149.195:5111

111.90.149.195:7766

Mutex

4ac24af1-9eb0-4f83-aa69-9a23a66819

Attributes
  • delay

    2

  • install

    false

  • install_folder

    %Temp%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1960-56-0x0000000000400000-0x000000000041C000-memory.dmp
    .exe windows x86


    Headers

    Sections