General

  • Target

    4c7e64c4bd075ec167cc3012357de26c5ba2ea486d7543e7d39f0f81770c895a

  • Size

    74KB

  • MD5

    d5a64f7c7d2921e6833ab4908f45c5a2

  • SHA1

    5f569ec84622b4d661b75a6950a076d0aef579a6

  • SHA256

    4c7e64c4bd075ec167cc3012357de26c5ba2ea486d7543e7d39f0f81770c895a

  • SHA512

    d8a5e7718310a2639cd29552dd4b99590d6368e6299aaa8eebe08eefbcbb1a9a4e7824caace8c3007955cb8a8ae0cee9831e71d783bc8ded746c6518e479b415

  • SSDEEP

    1536:xUUPcxVteCW7PMVgOyWIeH1bc/buLLhaQzclLVclN:xUmcxV4x7PMVLyOH1bcMLgQgBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

194.55.186.155:2424

Mutex

qncatmcnnrwluo

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4c7e64c4bd075ec167cc3012357de26c5ba2ea486d7543e7d39f0f81770c895a
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections