General

  • Target

    0e05714577948291d4d194ea8ddf6f8cc12dcdd31f01ba2195c0c4afb952cef6

  • Size

    73KB

  • MD5

    4e6a72392f01ffb3bae293a6c4b955d1

  • SHA1

    ab6910a9f4482e8409e35be2953cd8b26385927c

  • SHA256

    0e05714577948291d4d194ea8ddf6f8cc12dcdd31f01ba2195c0c4afb952cef6

  • SHA512

    24c5894443c641876c4969ab1e56e7833f09f0984e296a9a5dcc6f26138d9d22daf90f9c6fcd3f7114f1754656d42d1560965047b3353c40ac21f3d016a79a5c

  • SSDEEP

    1536:IU9ccx4y3lCl6PMVy1aievkWIKH1bI/91LgsQzcX3VclN:IU+cx4yVy6PMVgazbH1bIVxgsQilY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

xpjcrciguzejg

Attributes
  • delay

    1

  • install

    true

  • install_file

    WIN64.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/WPTghhr7

aes.plain

Signatures

  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0e05714577948291d4d194ea8ddf6f8cc12dcdd31f01ba2195c0c4afb952cef6
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections