General

  • Target

    Client.exe

  • Size

    63KB

  • MD5

    61e4c25c7d8a6ff5c64914ca26370719

  • SHA1

    76aa1d4a5c4090998fee9ec6ce914c669827bdcd

  • SHA256

    74e79b661e70921ba58097423fd8e7181f430f9a851acc5b14b2b75f597de791

  • SHA512

    0d96f11563cd679dc08211556d71e8e42f89ac5e4d2f59e4ff05d7cb1a88b5f12290f200f728a04b64136a7acec9eeee42184b6d4fd2ee0b17f23afeb4348982

  • SSDEEP

    1536:GJxFz3FI8Cwof4wBSeeiIVrGbbXwoQGeNpqKmY7:GJxFz3FI8Cwo7BLeXGbbX4Wz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Minecrosoft

C2

127.0.0.1:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    dnlib.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections