General

  • Target

    Client.exe

  • Size

    63KB

  • MD5

    973655cb7cf0a450f07d05f59f5374c4

  • SHA1

    76eee0d32541c5e832b0e59189d612652e87b794

  • SHA256

    99a66e183cf9a64df8ae103ab15421869d189e0e1b890bb0b665a36c5ff8db67

  • SHA512

    b2cfb7878dcd43a0e32560ab896030acf3cfacca5c8de982beff6c919203a154604b2cb5f5a9b4d4e98b410adfb9970937dd0a23d58105503b3764829834af3b

  • SSDEEP

    1536:yBeLvAdswPuCnbeeiIVrGbbXwhG6DpqKmY7:yBeLvAdswTnCeXGbbXygz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

wasted9sss1-51443.portmap.host:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    System32.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections