General

  • Target

    ff4e090050d2ecfe31965422df013204c660f3a2fa8cd0cb0c0441258418b7a9

  • Size

    35KB

  • MD5

    e8fff767815327a0dd23ff9bce1f1e57

  • SHA1

    fc83b63487a7c62dbcdf17b85b29688c65293ae7

  • SHA256

    ff4e090050d2ecfe31965422df013204c660f3a2fa8cd0cb0c0441258418b7a9

  • SHA512

    f2a2aebf006c5433ef0d1aff32fc4f2eb7e40fdb5086a03a426e75238eac698846119e31144950889db8f73dfad40203a7a94f4a97f28c6c76fa776c302fcd65

  • SSDEEP

    768:PEO9smn2ugA0QPkZAioVH5DblsoIf5yOjSPFbm8t6TBrqsgj6gXLQsCE:PEO9jaQPAwVZDbCoo58dmr5qshFE

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

shsajngnif

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/L6fX3GgP

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ff4e090050d2ecfe31965422df013204c660f3a2fa8cd0cb0c0441258418b7a9
    .zip

    Password: infected

  • b3d417b15e1f00fceee54400f8616f83e74e3f143ea885962ae380802c637841.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections