General

  • Target

    Client.exe

  • Size

    63KB

  • MD5

    a3e11000168ec850c83c943edff48b11

  • SHA1

    b408faf89cf7300a1550ab6b18d6c40e8bab4ded

  • SHA256

    d4ac15390713302556e3c6ea4fcf08fdf595982b2c56563a5a242572ece70f1e

  • SHA512

    1cf35e17cad47e769d513e01461879d0a52d71776044b0946d6672a637bfd9a8bbbb98075bade703df85b74263ae1c2cb026c347d1cc6524457d88b52a42a294

  • SSDEEP

    768:NhNpSSnt7iPDVoiM9J2OcXveeObMbNqV1+RSCv7mqb2nIpwH1oOptahPGeDpqKYC:Lpt8OreeiIVrGbbXwgGeDpqKmY7

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

127.0.0.1:2000

127.0.0.1:3069

taking-headquarters.gl.at.ply.gg:2000

taking-headquarters.gl.at.ply.gg:3069

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections