General

  • Target

    5500-486-0x0000000000590000-0x00000000005A8000-memory.dmp

  • Size

    96KB

  • MD5

    c63f992f6bc518758cbf926d2bcbac0f

  • SHA1

    ee8b8e6a36ced03910fe7404c9edab2a4d406be3

  • SHA256

    11cbb6892c3e5059c8cb22693297221f215e0d1111a8be66a191b99eaff1d5ac

  • SHA512

    b499f01a8e06836da1ff35141d9b33c35ec494cb8e6ed62d03b2504a7adde6778c9412da27ead4fa31eff4825ace54d75a20019fe004252b4329e5bc70b5a689

  • SSDEEP

    1536:mhUZAcxjVLcoCJPPMVOe9VdQuDI6H1bf/GDXQzcB7VclN:eUWcxjVLLCPPMVOe9VdQsH1bfqXQkxY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

89.23.100.93:4449

Mutex

oonrejgwedvxwse

Attributes
  • delay

    1

  • install

    true

  • install_file

    calc.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5500-486-0x0000000000590000-0x00000000005A8000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections