General

  • Target

    1912-140-0x00000000005A0000-0x00000000005B8000-memory.dmp

  • Size

    96KB

  • MD5

    2d934d1e5acb705fb71ac740b54e333b

  • SHA1

    d6bb649c4b6d3e66c16b8ac3634f2f22f4577e89

  • SHA256

    927876562ecc45605506286d4568a5ad0e30f2fc76daa4b9bdfd549dea38c220

  • SHA512

    2e7103297262fa4b9fdf6e06fcfdf6ef466d33ab82cc31322b10304e198a38a8957c4a3dcedd769d7d1267a7d950eae6cf7d9104f9c53f82ed3be194d620962e

  • SSDEEP

    1536:GUbkcx4VHsC0SPMVFKoxOJIbb1bG/GrQzcQLVclN:GUYcx4GfSPMVMoRb1bG+rQVBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

77.105.132.94:4449

77.105.132.94:80

77.105.132.94:8080

77.105.132.94:465

Mutex

unqcqotrpzwqx

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1912-140-0x00000000005A0000-0x00000000005B8000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections