General

  • Target

    214f7e336421ee1db46229b39e604d2358f1647cb486492160d60d49298d7917

  • Size

    74KB

  • MD5

    35d31ac262be2ff1d0a0d5cacc3f7722

  • SHA1

    2f8be08595cff50b47c67a7a90c5c88459d01544

  • SHA256

    214f7e336421ee1db46229b39e604d2358f1647cb486492160d60d49298d7917

  • SHA512

    45662371a85592126652ab2a9391f5176e0abd41908d7abe9d0337bd3b71b3773572f929e76a5679542de50e306d32b9cde390f4bfe8bc9fcbfc4b0223cd4d14

  • SSDEEP

    1536:iUKUcxoyR1CriPMVie9VdQuDI6H1bf/g6nSU7QzcuLVclN:iUzcxoyXkiPMVie9VdQsH1bfVSU7QnBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

194.9.6.96:8665

194.9.6.96:4449

Mutex

zdvnszfrghwqcesfnob

Attributes
  • delay

    1

  • install

    true

  • install_file

    dllhost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 214f7e336421ee1db46229b39e604d2358f1647cb486492160d60d49298d7917
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections