General
-
Target
BootStrapper.exe
-
Size
70KB
-
Sample
241103-hfvgeaxkfy
-
MD5
c801faeb55c9207eb2a2eb6d01a40147
-
SHA1
b49b8b24f77a4331546ce7ad829fb254cc823bd7
-
SHA256
ffb940a781e1863b4627ff098741593b3634283382ac40650e10c81e36f3aa0a
-
SHA512
9932ab4eb8dbc5f08a1b24c1925a715265ea0af8f08bdd4096349b1ffbc7c8e9e6fcc8e8b11996d47bf32f1126632fdaad541ee6869ec038f1f059dbd5e96cff
-
SSDEEP
1536:9x1bczsF7VinStbNppWGv1xUA89quIhiMequprC/3pFfPI1UX9Nntek:9x1PinS/ppWGtx4qb3pKCX9Nsk
Static task
static1
Behavioral task
behavioral1
Sample
BootStrapper.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
asyncrat
Default
specific-charles.gl.at.ply.gg:46182
-
delay
1
-
install
true
-
install_file
gooner.exe
-
install_folder
%AppData%
Targets
-
-
Target
BootStrapper.exe
-
Size
70KB
-
MD5
c801faeb55c9207eb2a2eb6d01a40147
-
SHA1
b49b8b24f77a4331546ce7ad829fb254cc823bd7
-
SHA256
ffb940a781e1863b4627ff098741593b3634283382ac40650e10c81e36f3aa0a
-
SHA512
9932ab4eb8dbc5f08a1b24c1925a715265ea0af8f08bdd4096349b1ffbc7c8e9e6fcc8e8b11996d47bf32f1126632fdaad541ee6869ec038f1f059dbd5e96cff
-
SSDEEP
1536:9x1bczsF7VinStbNppWGv1xUA89quIhiMequprC/3pFfPI1UX9Nntek:9x1PinS/ppWGtx4qb3pKCX9Nsk
Score10/10-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-