General

  • Target

    C11Bootstrapper.zip

  • Size

    214KB

  • MD5

    f10cd6c2c913e26f56156a3c752e45ed

  • SHA1

    08a63385a432c89419e21bb7c9be972032296788

  • SHA256

    fc1ad8d1483f0b1c94b55be7b7587b86485022ca4e62e6fb0c06e392dfaeecd2

  • SHA512

    8cc81d3cd29d2749234b0ec760bd929bd7ea5f6444e5fb51c9617c493cd166498296b258de7a7e647d5b87c0e1e825be7bebc502fd8bc5c295d282918830013b

  • SSDEEP

    6144:DA3cXkEnu8vjKbnU9tWCnHGXf3fgDmCyexHkv:DAMXkr8IUjmXfPgDmKxEv

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

Mutex

chhphkahmfnasuyziqc

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %Temp%

aes.plain
aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1210158511317590106/v9w3kiFGxTmHnaLb091GZCxjv8fdr5efj0qIDNAgPdpreNR5UKL8WQl7YxoqctUCkOnB

Signatures

  • Async RAT payload 2 IoCs
  • Asyncrat family
  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • C11Bootstrapper.zip
    .zip
  • C11Bootstrapper/Properties/C11Setup.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/GuiLoader.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/IndependenciesInstallation.bat
  • C11Bootstrapper/Properties/PageEditor.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • C11Bootstrapper/Properties/msgbox.vbs
  • C11Bootstrapper/Readme.txt
  • C11Bootstrapper/Start.bat