Resubmissions

19/04/2024, 14:01

240419-rbmqfaeb62 10

General

  • Target

    ClientSetup.exe

  • Size

    251KB

  • MD5

    a91750c64ba9c895f06cfe10938c9995

  • SHA1

    634180ea1b57441ca0e65db5a0b3cc93e22d1d60

  • SHA256

    f0031fd209a7a4c94b50ea20aaad11f62f4db0e847d63312190fec4cf8d77deb

  • SHA512

    886d6920c4307c664f87fccddc9beabb9ecfad2e3b2700fece35f36c4e38a311b08ae80bddd8566880964d3d9632283732e2c24c92b5212a2f811e5e2d20c1a9

  • SSDEEP

    3072:tUVcxMmw6PMV2e9VdQsH1bf7M6Q/R7c2ytBcL5BdkwvTkmEdWoY:t1w6PMV2aesVbzj4WwvqdT

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4330

127.0.0.1:4040

192.168.1.5:4330

192.168.1.5:4040

Mutex

sjjdsatnbcrkrb

Attributes
  • delay

    1

  • install

    true

  • install_file

    C11Setup.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ClientSetup.exe
    .exe windows:4 windows x86 arch:x86

    Password: dssghjkh

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections