General

  • Target

    C11Bootstrapper.zip

  • Size

    214KB

  • MD5

    350fd482e9f472a09cba68aeb0020ddf

  • SHA1

    7f31fbacd12e8a4fcd355c5cff97a2f2e67c4026

  • SHA256

    d3e1c2f2dd8d4a80459df74eeb9a1d967f91ff3af3b106be6cd7a96dc319a062

  • SHA512

    7af82aa1b373eb0d22d5289b4eddbfb1eddb2bda910a375c940ac1ca452b7e29e60224b44c143d9099be083cf72483448a865e41abb48928e0ec6567e9a7db6f

  • SSDEEP

    6144:NA3cXkEnu8vjKbnU9tWCnHGXf3fgDmzV4e42H6D:NAMXkr8IUjmXfPgDmzH42aD

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

127.0.0.1:4040

Mutex

chhphkahmfnasuyziqc

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %Temp%

aes.plain
aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1210158511317590106/v9w3kiFGxTmHnaLb091GZCxjv8fdr5efj0qIDNAgPdpreNR5UKL8WQl7YxoqctUCkOnB

Signatures

  • Async RAT payload 2 IoCs
  • Asyncrat family
  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • C11Bootstrapper.zip
    .zip
  • C11Bootstrapper/Properties/C11Setup.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/GuiLoader.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/IndependenciesInstallation.bat
  • C11Bootstrapper/Properties/PageEditor.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/msgbox.vbs
  • C11Bootstrapper/Readme.txt
  • C11Bootstrapper/Start.bat