General

  • Target

    96fd436f2e19e2b73942d2020df62970.bin

  • Size

    35KB

  • MD5

    5013234ff5b3147fcd2bfd709ec958d3

  • SHA1

    311ce46403be1a33ab7df6160f168837cde4bf95

  • SHA256

    caf225f9cc01e4cd2e57296d27e8b35df8052774e2af3963c6d63202651893a5

  • SHA512

    742d0a1db427c014c0727c247cd797e073543408427b1816b5dc8e704946328e72b9434c39256699633410771f736d277f1626424e157c920c60260fa310f836

  • SSDEEP

    768:jxacGT3DqsWK6apkS7vNiK6gQMLjtIBgE/HCAM0OHwN7vS112/Bv/rLL/:jwuM6wNihMGgE/ULHk7vSneL

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.2

Botnet

Default

C2

193.222.96.13:4449

Mutex

wxaqjwggdev

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 96fd436f2e19e2b73942d2020df62970.bin
    .zip

    Password: infected

  • 4a165517f5415fc61d91c06d2d0d9d00b2c77a6a8419617eabe91c967f180fb5.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections