General

  • Target

    cfc7fe4c48a0b43ca0482550c5b8cc4004d583825e25605b2cf2911062d871b0

  • Size

    74KB

  • MD5

    304ccda9cdfcd04a4da4dcd3b8359824

  • SHA1

    15f57b369bb27ce09925e4ac7eeccdd1230556d6

  • SHA256

    cfc7fe4c48a0b43ca0482550c5b8cc4004d583825e25605b2cf2911062d871b0

  • SHA512

    9e571a613dceae1c977d26c481ce6f7a9ff700f9aa748474ada86d17d8ad27ebf1ea11a885977943c9915e31fabba278b428b0b34b217315a0c9c2de9eea42b0

  • SSDEEP

    1536:DSi2V95qsWDbEhuijwsWDbEhuijsAOKrn8n/mywr+Gk3m6VLIni0btuhaqAqy8zg:DSpVzhr8eDrxbNi0btwHy8fBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

147.185.221.19:51216

Mutex

rofolmihxumlsy

Attributes
  • delay

    1

  • install

    true

  • install_file

    666.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cfc7fe4c48a0b43ca0482550c5b8cc4004d583825e25605b2cf2911062d871b0
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections