General
-
Target
Client.exe
-
Size
74KB
-
MD5
e4dac9e38d48d5d50f558bb3ea77b219
-
SHA1
49a53e206ae332336c07f6cf6b7d2bd3caf4df8c
-
SHA256
196e8e5dcfab24d269e9297abb9961cd914ce4cc76475564ba359bece433418c
-
SHA512
d36b2e3eb076430abfc96ec3f577d04fc21af532357745726c7c5e233aab3c887253488ba314651b8526c4c7840f211fb63df60cce05aee51012a14ef3eea760
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/YYmXQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bfQYmXQYBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
132.145.75.68:3965
yyhmudweswgsnbs
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ