General

  • Target

    2400-268-0x0000000000400000-0x0000000000418000-memory.dmp

  • Size

    96KB

  • MD5

    8807d6ad178b69a6006d9c243aabebbd

  • SHA1

    49e8390c0d4aea538f1bc60eaf3d8cc78d3391ca

  • SHA256

    35934052f1ea7cda24c4a5773c627b112bb6eb0119189f5ff3a2c057aab7fd0a

  • SHA512

    401b5c69676d8e059d5fdd6e15995572dba9908d4032c73780f531585710b3c9a63050b87bba97afa31495f2d42b97b6b3d3c93aa9f2749e0666e96ae28fb366

  • SSDEEP

    1536:SUKkcx9pXCTyPMVvABedIIiH1bH/JQzcSLVclN:SUDcx958yPMVvAI4H1bHRQDBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

systemer

C2

185.106.92.84:4449

Mutex

vgvndoxjcwprff

Attributes
  • delay

    5

  • install

    false

  • install_file

    systems.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2400-268-0x0000000000400000-0x0000000000418000-memory.dmp
    .exe windows x86


    Headers

    Sections