General

  • Target

    2440-1-0x0000000000250000-0x0000000000268000-memory.dmp

  • Size

    96KB

  • MD5

    ac2111639111bfdcee2a5b08a9c1039b

  • SHA1

    ad326950e6c6c1512618bbb99aa98a3bd876f988

  • SHA256

    cb89432d2d40498ba1db3e729b4082487df92c60ad0c43cc33e680c103cc7145

  • SHA512

    ddda66c8172ecc21cbe7ecc568761ecfa2c9678075c4cb1345ba1b9184c2f7fc92a9272b611419e76031fc8c0e4a52210fe7ba30d9813875cd2338b03b00053a

  • SSDEEP

    1536:nUmDcxzxUC7kvPMVee9VdQuDI6H1bf/+5UtDQzcCLVclN:nUEcxzu7vPMVee9VdQsH1bfW52DQnBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.1

Botnet

Default

C2

91.103.252.215:4449

Mutex

czzhqlpybaasnlh

Attributes
  • delay

    13

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2440-1-0x0000000000250000-0x0000000000268000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections