General

  • Target

    4552-3549-0x0000000000450000-0x0000000000468000-memory.dmp

  • Size

    96KB

  • MD5

    d5dce5787ac21314ff1406d0c285fb1b

  • SHA1

    ab27a8a50e80513d2f243759bd68728793a5e55d

  • SHA256

    c4f0febf0a03f00a21004c47360e94bb4dde18f1994c3a3b341862c28aac1805

  • SHA512

    fdd70645c97e8a91446d7e714c1a3dcf18973007780024ecf975b1100100b8f83c8101dba420ecd0709adf1eb1c2e0f1d453ddafae390009f33dfb050bff12d3

  • SSDEEP

    1536:cUKkcx9pXCTyPMVWe9VdQuDI6H1bf/ULlqQQzcmLVclN:cUDcx958yPMVWe9VdQsH1bfsLlTQ/BY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

154.216.20.242:4449

Mutex

shoogvdlxg

Attributes
  • delay

    1

  • install

    true

  • install_file

    $77pop2.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4552-3549-0x0000000000450000-0x0000000000468000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections