General

  • Target

    3020-1-0x0000000000430000-0x0000000000448000-memory.dmp

  • Size

    96KB

  • MD5

    487bfc89c4fd1f09c9e3395f298a303c

  • SHA1

    64dc740db187ebfaa8454f995762621b62dbcf0c

  • SHA256

    f72f54e76bb0b44cccb6077e5bd7130554024b2b1460d77997c82cbb55c4c90d

  • SHA512

    3631437a5114f73a8bde46e9b982d558264127dfcc351525ac357cef52cda2573a8d9c75175b327a4a476e2aa0ba4a47c17c71470e9e3d81e2543920dcd65905

  • SSDEEP

    1536:+UmDcxzxUC7kvPMVee9VdQuDI6H1bf/+5UtDQzccLVclN:+UEcxzu7vPMVee9VdQsH1bfW52DQNBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.1

Botnet

Default

C2

91.103.252.215:4449

Mutex

czzhqlpybaasnlh

Attributes
  • delay

    13

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3020-1-0x0000000000430000-0x0000000000448000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections