General

  • Target

    2872-6-0x00000000000C0000-0x0000000000434000-memory.dmp

  • Size

    3.5MB

  • MD5

    c808cbcac3ced77aef7fe1cf0310023b

  • SHA1

    c2895b6cd9b93cdaba0d6737c330f1d5e2856825

  • SHA256

    c9a116a5e7265ef2bcf97b4ad483c0712664bb767a7291c0a4b7115c0e237828

  • SHA512

    59d47d530516c6dc3bd0e1eb511fb359a90ef7982d81fc1bd82a6ef975a33a1b00e60b8cda3b8799cec7c3673efa3fafb4cbd7cb5866e545efa57aef39b1eaa9

  • SSDEEP

    49152:5w9RB17lkLN5Kj5YVGGw7m2KSxnJAx/Dsz2NAi4wbpL3lfueW2FR:69RB17ldj5Gd5eJAGzyAi4wNLoER

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

asdaf1231~~AQsdвфыау ~!|}{?>:"

Attributes
  • delay

    1

  • install

    true

  • install_file

    mdconfig_01.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/pdRjLLjy

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2872-6-0x00000000000C0000-0x0000000000434000-memory.dmp
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections