General

  • Target

    5588-527-0x0000000002040000-0x0000000002058000-memory.dmp

  • Size

    96KB

  • MD5

    2bf046c032b51831769f56bd8d253cde

  • SHA1

    f514adace9d7e72738d0726db8c9447be692e131

  • SHA256

    c1019eb36a9a132d0fb43ea7067d5eb654bd072c9939ff2773ca4beb77df8c0c

  • SHA512

    4ecdafdb456aa44bcba80d453a42189186b4c01a950a02f62e654d00675a865c257def0f86552eb792717007b0e210d7a07036c592e9a36e846f9ecdad5386b3

  • SSDEEP

    1536:6hUZAcxjVLcoCJPPMVOe9VdQuDI6H1bf/GDXQzc47VclN:qUWcxjVLLCPPMVOe9VdQsH1bfqXQxxY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

89.23.100.93:4449

Mutex

oonrejgwedvxwse

Attributes
  • delay

    1

  • install

    true

  • install_file

    calc.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5588-527-0x0000000002040000-0x0000000002058000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections