General

  • Target

    c52fa3a0f171271b2b9a962c581b2183cdcf66622e35f9ec4530a26b13c6ba64

  • Size

    77KB

  • MD5

    d7fdc3235eba3280a7ee70a30b97193a

  • SHA1

    d52a9e290a46919c1cefb4b96c2055f81983e45f

  • SHA256

    c52fa3a0f171271b2b9a962c581b2183cdcf66622e35f9ec4530a26b13c6ba64

  • SHA512

    afff2be759992d029d47a198bcf08612d9ae6399d0d3da14c7ff694735bf22cface56092b8d4f1df30daf790798cffc5123a1669487309d313dcd0cdcf3a5202

  • SSDEEP

    1536:OUakcxw+/9CZSPMVae9VdQuDI6H1bf/r3EQzcCLVclN:OUTcxw+1uSPMVae9VdQsH1bfYQbBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

185.162.75.19:4449

Mutex

clnivizlzzwamiwcu

Attributes
  • delay

    1

  • install

    true

  • install_file

    VenomClient.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c52fa3a0f171271b2b9a962c581b2183cdcf66622e35f9ec4530a26b13c6ba64
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections