General

  • Target

    5288-337-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    3f0f59d239e09190197c01a5072ab481

  • SHA1

    56dee34917286243f0444dea71b7e717e61bf85d

  • SHA256

    f514adb60db039acdcdd64bd9630e7d00072faae0eb6f1d29684d942321a71ec

  • SHA512

    8dba075e6d36a52a4f38a655715a7fd580380b99be38940c2f77e64d5137a08abbb128e9fd147545cc18584be8cc98b5c44f42bb9edc1a03df7917f3fc0b030a

  • SSDEEP

    1536:yJNXXlloMdexiOzSeeiIVrGbbXwJbeDG2DpqKmY7:yJNXXlloMdeFzLeXGbbXiezgz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

4.229.227.81:8080

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    update.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5288-337-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections