General

  • Target

    4868-881-0x00000000006A0000-0x00000000006B8000-memory.dmp

  • Size

    96KB

  • MD5

    d2c32926f72f1b5fcbcdbf88c240a8ea

  • SHA1

    be65006643eb696e04d9ba4b89928e2a039ae56b

  • SHA256

    09d809dc2886a8cf63f9737e5adc6cd79e4b42e22d3da5397d8ba43060ff32cf

  • SHA512

    68bfa1fd1430c3cd9ee4751d1147ac2658d3e09ae2aa9c2ebffbff28e107c9921eb3caa44d45f887d0d336598b0c0d0efb31f8161f90b47993dd29a754c50cf6

  • SSDEEP

    1536:ghUZAcxjVLcoCJPPMVOe9VdQuDI6H1bf/GDXQzcM7VclN:MUWcxjVLLCPPMVOe9VdQsH1bfqXQZxY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

89.23.100.93:4449

Mutex

oonrejgwedvxwse

Attributes
  • delay

    1

  • install

    true

  • install_file

    calc.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4868-881-0x00000000006A0000-0x00000000006B8000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections