General

  • Target

    C11Bootstrapper.zip

  • Size

    214KB

  • MD5

    f2a3127167527858f3df2856faf175a1

  • SHA1

    f65ae05fbadc1230d4d4511523c1220bd066a251

  • SHA256

    b5b756ca3f6097116ccd6b5b284bc7c0ace10a5842a70ce96ebefde62b687f49

  • SHA512

    e5f3dcd5cc45fe0e6e285d1c74702f4369113b07dfa2be383e61cc98b38715562b542d4ecfcadfafabdeddf5c20794085e0f17f9e3b209381c985f6b99cc3683

  • SSDEEP

    6144:LA3cXkEnu8vjKbnU9tWCnHGXf3fgDmRyno8wIzHgo:LAMXkr8IUjmXfPgDmRyno8wIzAo

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

127.0.0.1:6555

127.0.0.1:0

127.0.0.1:4040

Mutex

chhphkahmfnasuyziqc

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %Temp%

aes.plain
aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1210158511317590106/v9w3kiFGxTmHnaLb091GZCxjv8fdr5efj0qIDNAgPdpreNR5UKL8WQl7YxoqctUCkOnB

Signatures

  • Async RAT payload 2 IoCs
  • Asyncrat family
  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • C11Bootstrapper.zip
    .zip
  • C11Bootstrapper/Properties/C11Setup.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/GuiLoader.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/IndependenciesInstallation.bat
  • C11Bootstrapper/Properties/PageEditor.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/msgbox.vbs
  • C11Bootstrapper/Readme.txt
  • C11Bootstrapper/Start.bat