General

  • Target

    db7cc62235cb2a0ad00f44edf682e2536d69a14d171ac583cd1402024ee0166d

  • Size

    74KB

  • MD5

    099e17dbdd5e270ba1108964878b02bf

  • SHA1

    6e36cb886f79b9bc15d65e63fda4e0bd4bb94a20

  • SHA256

    db7cc62235cb2a0ad00f44edf682e2536d69a14d171ac583cd1402024ee0166d

  • SHA512

    90c253f82a183fca9b3bfdf5ec06a1dca6d092978aa4132518bcd0a4d4706ea3b505d3af514737859ad481f8087733236cc592dcc7b0a94fa0bad289fc9199e8

  • SSDEEP

    1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/9N0nPXQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bflN4QYBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

Mutex

szznovqkagrl

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • db7cc62235cb2a0ad00f44edf682e2536d69a14d171ac583cd1402024ee0166d
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections