General

  • Target

    3ecd335862007c0a507c0c9426be4145ee8816b562fad2f80d585b0dd39cf444

  • Size

    74KB

  • MD5

    d1e14acc8e15993a0bc97536b210a689

  • SHA1

    e5c971e6fa93812e96fe576b1f5e4dbb7f086669

  • SHA256

    3ecd335862007c0a507c0c9426be4145ee8816b562fad2f80d585b0dd39cf444

  • SHA512

    ee54def6efe7a999a4f813240f1202fa78118b57e8582e3c4223a0710472fced495d3174000db888f714ffcbb6fc4f3cb4437639c7d69e9f1dbf9d87ea208ec5

  • SSDEEP

    1536:lU1kcxEb44MCqSPMVTFZMiFIlH1bM/wPbb6hb5jQzckxLVclN:lUOcxEbzM9SPMVTFZMiKH1bM4TbEbBQy

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

WIndows Session Manager

C2

147.185.221.19:9999

Mutex

asdfrhdhnzevhenaz

Attributes
  • delay

    2

  • install

    true

  • install_file

    WIndows Session Manager.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3ecd335862007c0a507c0c9426be4145ee8816b562fad2f80d585b0dd39cf444
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections