General

  • Target

    4328-16-0x0000000000400000-0x0000000000418000-memory.dmp

  • Size

    96KB

  • MD5

    b8cb680209ac56e4473b94c442d1f900

  • SHA1

    4a835821d573c99417e95015f395e29adf6c3dfe

  • SHA256

    af4b62c9097668644cdb3640e4e462e7369e1dc3001c66c98d28ac27b6bfba83

  • SHA512

    fe3ccc56a9dd13c0b5ad3e53e3ecd3cc81af5aa9a7a664df6b5bc4f4e5aac75382ab8ab99c94d7b7711b46521b415157250d7bc213d7b5ef7ef1e6c2439e3b2b

  • SSDEEP

    1536:VUUkcx02mCByPMVqe9VdQuDI6H1bf/psjRQzcmLVclN:VUBcx0XGyPMVqe9VdQsH1bfR+Q/BY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom Pwn3rzs' Edtition v6.0.1

Botnet

Default

C2

80.66.79.27:4404

Mutex

gfduktfdkfdrukfvluydfodtkfgvklrftikcguftu6dukfcodt

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4328-16-0x0000000000400000-0x0000000000418000-memory.dmp
    .exe windows x86


    Headers

    Sections