General

  • Target

    434fc1fcde79cced66c7784f22b1703b41dd77f1800edd7bebe4343f479080d8.zip

  • Size

    35KB

  • MD5

    d5ebc55358a27529224dfe84a105427d

  • SHA1

    48ddc62aee91421009332ec9a0dcc82694e0b817

  • SHA256

    be30c669c6d3c84d50291597b4f9071164c136609b0a3aac1344186c2c579cda

  • SHA512

    89e564de999f2debc9a838798f8edc5411034698330c3ac16f627dce0380a34d8714407bf5ff82d854d2bb07f41321109e6e949e02074c4e8157c72460be656b

  • SSDEEP

    768:SbKOPKzPId3ERSMRpUV/IxYC6HlmuhGXWT0V1G8H4E0Pd:StKCUR/Rd9gYjDvYEQd

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4782

84.44.148.177:4782

Mutex

ufnwppwtssgsve

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 434fc1fcde79cced66c7784f22b1703b41dd77f1800edd7bebe4343f479080d8.zip
    .zip

    Password: infected

  • 434fc1fcde79cced66c7784f22b1703b41dd77f1800edd7bebe4343f479080d8.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections