General

  • Target

    0c363101553b0ae76fd673bd22f91e76ea7acd7c406356539f25be4c532b044f.exe

  • Size

    74KB

  • MD5

    a9bd8605a3911df7c12ddc7e5cd44db9

  • SHA1

    5897044e8349d43ed3c93c70d7afb1dfb940f24c

  • SHA256

    0c363101553b0ae76fd673bd22f91e76ea7acd7c406356539f25be4c532b044f

  • SHA512

    a1ac02d13ff6fae4ce5d9c198e54a7120d65dc1815ac2f72a94168fac7fd996c3871bfc2a7b8ac8ad7042a4399ca88f08d1409ec2ed71fa7466fb7ef9580a745

  • SSDEEP

    1536:LUk0cxVGlCBiPMVye9VdQuDI6H1bf/6N1Qzc+LVclN:LURcxVMWiPMVye9VdQsH1bfCQXBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

iawkmajvls

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/ZQRGYcGR

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Detects executables attemping to enumerate video devices using WMI 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0c363101553b0ae76fd673bd22f91e76ea7acd7c406356539f25be4c532b044f.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections