General

  • Target

    2a468d20b8c63c210a8c991c8d745bc7fd89a75dec4680f47bd0afd4d8a6f190

  • Size

    88KB

  • MD5

    5e25726a99da275e37eecbb87708529e

  • SHA1

    366218c3aac3eb6077c128ed9b8753a28deec857

  • SHA256

    2a468d20b8c63c210a8c991c8d745bc7fd89a75dec4680f47bd0afd4d8a6f190

  • SHA512

    308d1acf87bde009c45b928ea318e61f0aa507ee7a7c54cce55fd1abe94437d12d59aaa7abd5e8bd5b1a483cc39ac62ee32a2b270a4a755d49fb2667802c88f0

  • SSDEEP

    1536:eUckcxw+/9CZSPMVae9VdQuDI6H1bf/4LPQQzctLVclN:eUpcxw+1uSPMVae9VdQsH1bfAjQQgBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

171.233.98.70:18274

Mutex

douhgmolozhnapqdo

Attributes
  • delay

    1

  • install

    true

  • install_file

    Registry.exe

  • install_folder

    %systemroot%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2a468d20b8c63c210a8c991c8d745bc7fd89a75dec4680f47bd0afd4d8a6f190
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections