General

  • Target

    2976-0-0x0000000000250000-0x0000000000268000-memory.dmp

  • Size

    96KB

  • MD5

    519d9175a81420553fe4be2dba5899c5

  • SHA1

    39667a983a974e75458feb9214f542b9a86a56a1

  • SHA256

    d48ce8e31beccb5b31fa78b30ed4b62ffc40b2ffcfe2580f040887271f03e3b0

  • SHA512

    924d433ac00e0960e516f2f33182a5b2d312e2579dcf9ac2f1e686436fc87e08ee12129a33799be57e12602068539f3765103ff8aca01995e57b3d01f5921824

  • SSDEEP

    1536:KUmDcxzxUC7kvPMVee9VdQuDI6H1bf/+5UtDQzcCLVclN:KUEcxzu7vPMVee9VdQsH1bfW52DQnBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.1

Botnet

Default

C2

91.103.252.215:4449

Mutex

czzhqlpybaasnlh

Attributes
  • delay

    13

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2976-0-0x0000000000250000-0x0000000000268000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections