General

  • Target

    1320-24-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    3325e18ae79b9ed4bd61f7c27b7f1148

  • SHA1

    eddd2ae9502def5642094d7f9e5b23ea0b841253

  • SHA256

    ad738c1a88c104aa57d36f4c03c5c5b4ee146a6c429b229a24c1b136813df84d

  • SHA512

    ffe3227ceb1abfa06dea1679bf1a9e62c52a4f108e4abbcd5af7e907a29e21fa28399fc52a04b6fd3df5551decfccdb97bd7140c0596c50102f1226a3c536992

  • SSDEEP

    1536:ohB5LrUwk4XO01VRqI/FNDDegoiLh9bbnwLmGGG:ohB5LrUwk4XVV1/FNDDeg7h9bbnrG

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

WDKILLER

C2

blue.o7lab.me:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1320-24-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections