General

  • Target

    84240dae8c99b925298e95512aae1524fd0595c0d0c0edacd61a5cefa1dd14ba

  • Size

    73KB

  • MD5

    be5ba40f7d37594b36bdf692407febe5

  • SHA1

    e0e6d5d62c05fa451155869f8ac065408042d03c

  • SHA256

    84240dae8c99b925298e95512aae1524fd0595c0d0c0edacd61a5cefa1dd14ba

  • SHA512

    7c29fbdca8b3c0316d8f7878da0b31de1137c9d2516dde473982fd4d447fb27b8b506f5bfbf358b29a6afd770f7a4d515fd3d800523426a31454b9a94a02fd46

  • SSDEEP

    1536:3SUEkcxNYungvHZDJ/SkXizIqksbLvPMwErk18HCqdypH1bAbWvDJ2DwzUvbVclN:3SUxcxNYungPZDJ/SkXizIqks/vPMwEi

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.2

Botnet

Default

C2

80.76.49.148:4545

Mutex

jiytpolsfawmdcmo

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 84240dae8c99b925298e95512aae1524fd0595c0d0c0edacd61a5cefa1dd14ba
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections