General

  • Target

    296674e268379a496e66b4e571881c32e75e46e661aa7247405201a126a782c6

  • Size

    74KB

  • MD5

    32b65e6e0e6112b5dae6b43f214c28f6

  • SHA1

    8c268ab559f6cce631c9da6949cc7c2d4abced08

  • SHA256

    296674e268379a496e66b4e571881c32e75e46e661aa7247405201a126a782c6

  • SHA512

    c670f08f60bf3934817f842539a2dc3534c2503234892f4ec3d4809e4ab88624810dbca7c31002d5c2c900145d7fe5db7727746268bdcefd36a893cf11606a07

  • SSDEEP

    1536:uUme0cxFVTuCGbPMVOe9VdQuDI6H1bf/JvQzc+LVclN:uUm3cxFVaBbPMVOe9VdQsH1bfhQXBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

Mutex

lol.exe

Attributes
  • delay

    1

  • install

    true

  • install_file

    lol.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 296674e268379a496e66b4e571881c32e75e46e661aa7247405201a126a782c6
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections