General

  • Target

    nabeel is adasdas.exe

  • Size

    63KB

  • MD5

    e8010afcc76c30b577a0a79109de0bba

  • SHA1

    ba2856437e41cd63ba8fb776d4d1f0cc7f2bdacb

  • SHA256

    73beb5be671e2255a5ae60dae202001e047edb58c7ba1851cd68e63d0f0469c4

  • SHA512

    b3f7e645beb730bd6ad2bad45f8ca50fcca54bed5a33dff32c2eb587b08a5e39e96302cf59db785cac4b85eaf58ab709c386d7683c43d909d07cb0c3859d6cb2

  • SSDEEP

    1536:rBeLvAdswPuCn3eSderSGbbIwIrKAaGuDpqKmY7:rBeLvAdswTn3ew/GbbI5rKlgz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

wasted9sss1-51443.portmap.host:51443

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    System32.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • nabeel is adasdas.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections