General

  • Target

    .exe

  • Size

    63KB

  • MD5

    d6aeae6095e4a51695bbe6425d0184d7

  • SHA1

    e1963ee156f9c91684f0b1fd15a1b30b7fc23438

  • SHA256

    5829681f6673e16158d82d261930505b78bbba57e1674ba4734888eedbc63c4a

  • SHA512

    1841a069a4943a905cc72cfa90326f7af2c4ed392b82dabc8c38f6fa5ae8113adb776f24fbde7de7d4f7a2da31f6cbca8b5e917e1c08cfbf5d3ebd70e59bd3d4

  • SSDEEP

    1536:QhB5LrUwk4XO01V5eeiIVrGbbXwyF/GODpqKmY7:QhB5LrUwk4XVVseXGbbX7vgz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

127.0.0.1:4449

127.0.0.1:22

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • .exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections