General

  • Target

    d48e8f00d402bc9f8f1b34d2e6fde533.exe

  • Size

    74KB

  • MD5

    d48e8f00d402bc9f8f1b34d2e6fde533

  • SHA1

    c1df05939b104a52a187197a99655dbb0600560d

  • SHA256

    d61022cef95af3e20bb237b2690c817d948c3ea99a5f11153eca3bcfff034eb0

  • SHA512

    2a3acb534950f6cde5fc4178055038f4e76f1ad9bda3262f622c16a0a1890f50fb6bb82b2783ed58755c772be0880a9aadbd54c48ffe7c50cd53ec36c8d0e1be

  • SSDEEP

    1536:EUUPcxVteCW7PMVyUiLsiIyhH1b2/pkMWra1BQzc5LVclN:EUmcxV4x7PMVNiFhH1b2x2rkQwBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

94.156.69.242:5000

Mutex

rufrwqqzhtx

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d48e8f00d402bc9f8f1b34d2e6fde533.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections