General

  • Target

    EXTERNAL V2.exe

  • Size

    74KB

  • MD5

    95681056acfe98ba5e076358562a077f

  • SHA1

    2cd0570db34c7e3e6a9eb856b7f1e6c9c72d7730

  • SHA256

    abb03293aeb7eba820207df303ec68e5a37b06504ade6bc2bcd1c6097ced640a

  • SHA512

    515fede4cc7f7342819259512b18043fc088b7ff56a05f2c48ee1ee9d207eda0f385866de2b6ba9796faf8403ecc4587e6f7b078a17ce1ae6164dda58d964c16

  • SSDEEP

    1536:vU0AcxOIWC72PMVM0AuoIlH1bj/h79rw6LHQzceLVclN:vURcxONo2PMVM0znH1bjYqHQ3BY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

132.145.75.68:2665

Mutex

paehggiwaboqbtrlcgu

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %Temp%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • EXTERNAL V2.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections