General

  • Target

    1372-56-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    57c3823154adc72f935d4a036797d8f2

  • SHA1

    282817947d4417b987b9a13e0502a914973902d0

  • SHA256

    b3965607804141042882190c08e0960f4b0e2cf0585cf4e796d6347bc65bfa19

  • SHA512

    f860a8d0a14248372c42cca0b525c6362441cf2153b0347ad2fe807725d2881109c0c439c6ba8d420685acd0999f26ae77f7c61d67055e33fbc675ee9b00cbdc

  • SSDEEP

    1536:DhgBLTM3Ufc0cMdOeei0EmGbbXw75zBahLGjDpqKmY7:DhgBLTM3Ufc6d3eFGbbXGdIYgz

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT 5.0.5

Botnet

Venom Clients

C2

154.12.252.41:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1372-56-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows x86


    Headers

    Sections