General

  • Target

    VulturiStealer.zip

  • Size

    305KB

  • MD5

    310fe8b0fb9bb423fa65b93bbbbd2b93

  • SHA1

    84d9794994cc43ecc98fc982e3b429022cc1b17d

  • SHA256

    ad5759eb050f0a4d2efee58b935d0ad1a314299de5461fa67bb7d10b77150fed

  • SHA512

    e7348c95707deab680894476942003b15e329650fcf88bba6dba342ef5983ae8abddae81f35225b7778b9ce6347942b82deec908cbfd50c02c19ef93cbeadba6

  • SSDEEP

    6144:ZXbmsirssnoBRtMUVEq0ru8x3MGb50uicPYaCmUFGDQc0Ms82iDaelmNhZqT:ZXbmsJBRyZxcGbA/m/EpTuMNDqT

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Microtex

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:4444

Mutex

0UQeXDJaDUAl

Attributes
  • delay

    3

  • install

    true

  • install_file

    Mircorsoft Store.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 4 IoCs

    Checks for missing Authenticode signature.

Files

  • VulturiStealer.zip
    .zip
  • Vulturi/AlphaFS.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections

  • Vulturi/CL.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • Vulturi/Extreme.Net.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections

  • Vulturi/MaterialDesignColors.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections

  • Vulturi/Microsoft.Xaml.Behaviors.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Code Sign

    Headers

    Imports

    Sections