General

  • Target

    fc86ddca953607a35780f040d9113b9b76d5b30052dc32989c683ad1ba4d3187

  • Size

    115KB

  • MD5

    569bcd8d2b8df0a8f2dc40cfda2c820e

  • SHA1

    e288157bb3ccd3af26242906353a9736a1df5b78

  • SHA256

    fc86ddca953607a35780f040d9113b9b76d5b30052dc32989c683ad1ba4d3187

  • SHA512

    8b400614fa495599c64aed53f7ee2fdb68865309c989a8a2732ad6d5abb295e5368981a47a0819dc7769206f855d66033db2c329947df8155e8324cddd57e3fe

  • SSDEEP

    1536:hUUPcxVteCW7PMVee9VdQuDI6H1bf/t/QzclSjVclN:hUmcxV4x7PMVee9VdQsH1bfhQmSJY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

192.168.0.60:4449

Mutex

ruzawhsokbonuhb

Attributes
  • delay

    5

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fc86ddca953607a35780f040d9113b9b76d5b30052dc32989c683ad1ba4d3187
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections