General

  • Target

    tr.exe

  • Size

    74KB

  • MD5

    297a7df52e1057b2205815014c641b22

  • SHA1

    72c2dd4a8ddd8dafd78bcbd4414f45e14c512a0e

  • SHA256

    c24dc1d50b78f8f5b2740b5658347212c8b1f9196de50dd638e72e42d37afb02

  • SHA512

    f774d69e212bdc1b7fd72fec6ea216e576415fa685e416488a970bbc65239f39e8af633ac2325cc9eb165d8042af6073d7bd5eb92b1b2971271c55960dba2b23

  • SSDEEP

    1536:PUk0cxVGlCBiPMVB53pIZl3H1bI/lQzcaLVclN:PURcxVMWiPMV7sl3H1bI9QLBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

laegpkrxtpvxpx

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/73rUA0XA

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • tr.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections