General

  • Target

    C11Bootstrapper.zip

  • Size

    214KB

  • MD5

    554a6628d2a45997875764e432152e6e

  • SHA1

    2ffcfba2654c6c6e3ffe267da5dd47e661cfdb5c

  • SHA256

    60250d1395011fa3fafae608a46d70882fc4e1ad13b7146eed27d49344edb554

  • SHA512

    f028158395ec4b648665fa200089d9005f539bd6dcf95946bb08d2a20dae0c731a24ac738f76777a4df24943ded0b12652988904df2010f892b2308d9834e766

  • SSDEEP

    6144:iA3cXkEnu8vjKbnU9tWCnHGXf3fgDmacEA48fHJk:iAMXkr8IUjmXfPgDmacEA4gpk

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

127.0.0.1:6555

127.0.0.1:0

127.0.0.1:4040

Mutex

chhphkahmfnasuyziqc

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %Temp%

aes.plain
aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1210158511317590106/v9w3kiFGxTmHnaLb091GZCxjv8fdr5efj0qIDNAgPdpreNR5UKL8WQl7YxoqctUCkOnB

Signatures

  • Async RAT payload 2 IoCs
  • Asyncrat family
  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • C11Bootstrapper.zip
    .zip
  • C11Bootstrapper/Properties/C11Setup.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/GuiLoader.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/IndependenciesInstallation.bat
  • C11Bootstrapper/Properties/PageEditor.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/msgbox.vbs
  • C11Bootstrapper/Readme.txt
  • C11Bootstrapper/Start.bat