General

  • Target

    1664-56-0x0000000000660000-0x0000000000678000-memory.dmp

  • Size

    96KB

  • Sample

    240128-xy3cashghq

  • MD5

    3323761bcbfef3bbf10a3ef7c2dcc20f

  • SHA1

    5102aea7551611452cb09e457783abeea4ce2138

  • SHA256

    f788a155f3386aa03762e3cd1dda674b86e0de4266114f7ccf30e856a25b989f

  • SHA512

    6ed2f48d9a9896ded27c8c3e370a01506812517259e37c2ce1060badd9d174f29b95bcead478ae39ff28804aae42cdedb30734b250eb46a7f90c07d09fb7117b

  • SSDEEP

    1536:0UUPcxVteCW7PMVwXhONIgZ1bO/U9LvQzc/LVclN:0UmcxV4x7PMVwXaZ1bOc97QKBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

82.115.223.244:4449

Mutex

fnpxcekdvtg

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      1664-56-0x0000000000660000-0x0000000000678000-memory.dmp

    • Size

      96KB

    • MD5

      3323761bcbfef3bbf10a3ef7c2dcc20f

    • SHA1

      5102aea7551611452cb09e457783abeea4ce2138

    • SHA256

      f788a155f3386aa03762e3cd1dda674b86e0de4266114f7ccf30e856a25b989f

    • SHA512

      6ed2f48d9a9896ded27c8c3e370a01506812517259e37c2ce1060badd9d174f29b95bcead478ae39ff28804aae42cdedb30734b250eb46a7f90c07d09fb7117b

    • SSDEEP

      1536:0UUPcxVteCW7PMVwXhONIgZ1bO/U9LvQzc/LVclN:0UmcxV4x7PMVwXaZ1bOc97QKBY

    Score
    1/10

MITRE ATT&CK Matrix

Tasks