General

  • Target

    2504-9-0x0000000000400000-0x0000000000418000-memory.dmp

  • Size

    96KB

  • MD5

    d41e7d580c2abbea2e8ffaedcce7413e

  • SHA1

    d9f8cffff7e6ddc916ff4de94a92ee313710f505

  • SHA256

    312385de50139961b58b9d8525c62b96513405b78399f2db41ca0defb5b27228

  • SHA512

    58008638761886df733268e7c750aa06b969c23998d1d7348176d6b76fb75cef51e7ac594108c806c90ea75459be13f3a051b1d3ec37f9cf814d993d8e78a466

  • SSDEEP

    1536:cUgzcxr7JcC4vPMV2e9VdQuDI6H1bf/P1+heeQzc:cUicxr7eDvPMV2e9VdQsH1bfwhHQ

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

109.234.34.210:4449

Mutex

ahvhbgkuuprdzvf

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %Temp%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2504-9-0x0000000000400000-0x0000000000418000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections