General

  • Target

    Client.exe

  • Size

    63KB

  • MD5

    d940b2037a268131f79b027a9baf3735

  • SHA1

    4658c61d6672cd94d480f59c6f8c95b4e5713cfd

  • SHA256

    71b2495ff7cd6045a8c9ea3845a222b4def439f4a587069eeb6322ea35edd8bd

  • SHA512

    2fd0754cd968b5e02299c8e609688a32290d347489d0a37bb951c58b54fa90f0864794b531370b367703c93f42795d202fb1aeecefa6553f53c416bc27585a42

  • SSDEEP

    1536:QhW5hc1kw0kV7eeiIVrGbbXwwzGODpqKmY7:QhW5hc1kWVieXGbbXZ7gz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

Sanael-62946.portmap.host:62946

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections