General

  • Target

    c35c9895b90a75a0d8dd13c38c9fe565e693887f96334ea3ae762a160027ef8c

  • Size

    74KB

  • MD5

    5bf4e6ee7c17815fa84e47b8e70cc562

  • SHA1

    445024fe41a4e64db7dfcfa3ddb4e991f1420e94

  • SHA256

    c35c9895b90a75a0d8dd13c38c9fe565e693887f96334ea3ae762a160027ef8c

  • SHA512

    4ad41ab0a5180dcc96f8cc512ea1e284ef08593c27be1c022709f2003f0d7509d6b1382873807631781f248e7d722187d016dfdd6e778a2f0366fc0a4595299d

  • SSDEEP

    1536:vUFAcxehvCw2PMVDe9VdQuDI6H1bf/RyZNpHpEQzceLVclN:vU6cxe1/2PMVDe9VdQsH1bf5yZzHpEQS

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

86.208.62.200:4449

Mutex

eobsjccgfymzffybs

Attributes
  • delay

    1

  • install

    false

  • install_file

    mama

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c35c9895b90a75a0d8dd13c38c9fe565e693887f96334ea3ae762a160027ef8c
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections