General

  • Target

    2032-60-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    0bb259125f1ebd8e924007ba6cee322d

  • SHA1

    68e3760d1844f3c6f78e422be1c1cdef71a09717

  • SHA256

    b7ad4a537fccc94e90a1e8eea79164315e57622771e75a1371910a407a01de3d

  • SHA512

    3d641044aaabce28102f54f656246453b4db44028999d5bc791927421d95e38a05cf902ee3241578996393279c5fe2a7ba8f01d3cc609155ebb94d308b7e5b92

  • SSDEEP

    1536:PntG0Ag1JfxQ7Cqmhgkz1bbsTxRQxnasas:Pn2g/x/qcgw1bbsTgxaU

Malware Config

Extracted

Family

asyncrat

Version

VenomRAT 5.0.3

Botnet

Venom Clients

C2

ghankall40.duckdns.org:8890

Mutex

Venom_RAT_Mutex_Venom_RAT

Attributes
  • delay

    0

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2032-60-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows x86


    Headers

    Sections