General

  • Target

    BYTER.exe

  • Size

    74KB

  • MD5

    cb0cb9b0481344fe9d4ba729fd378dcd

  • SHA1

    989689fc787caaf872e8253f7fbb9217faef1213

  • SHA256

    318cfba6bedb2b453226299ab81c408b6d493ab2b0d6940e99ead144ef687db0

  • SHA512

    679bf4af003e6912ad2d6a353978e30cba4dcf2b7bebf28bf4c6adb6bc525d7fd719fcf2eb6ae2889a79633f958f07c6a7a648b9ea4c2740f3d167a84fd6bc02

  • SSDEEP

    1536:AUC8cxMcpCn6PMV2e9VdQuDI6H1bf/EI3vQzcSMVclN:AUTcxMmw6PMV2e9VdQsH1bfR3vQfOY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

10.0.2.15:9090

10.0.2.15:52033

147.185.221.19:9090

147.185.221.19:52033

Mutex

ukamffwfhwrbbir

Attributes
  • delay

    1

  • install

    true

  • install_file

    Steam.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • BYTER.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections