General

  • Target

    1bb203028d43d86183bb7b08f8c816f5bb4c3caf5dfbd68ad6b3da08a955a4d1

  • Size

    174KB

  • MD5

    99024c260a74fc45de9c710a4784bb19

  • SHA1

    b136395584a6f82bbce15c27c38bb7756839c217

  • SHA256

    1bb203028d43d86183bb7b08f8c816f5bb4c3caf5dfbd68ad6b3da08a955a4d1

  • SHA512

    0239dca06494317ac50b280ff3ec2dffcfdcff73f81b61f577ec69301d73e4d1a7e11110fa8d88dab19255a59b4f496e3cdda74b3015bb5e232cc666627b337b

  • SSDEEP

    3072:PNE9syFmvbAsRuMvm2sEw2B8q7VsIUaY3s06vustbSIByk:PNE9mAseEu3sSubV

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

50.18.145.13:14445

Mutex

qkghdcwldgxftyjz

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1bb203028d43d86183bb7b08f8c816f5bb4c3caf5dfbd68ad6b3da08a955a4d1
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections