General
-
Target
bundy.exe
-
Size
45KB
-
Sample
241117-hg5c1axrcq
-
MD5
7f6f0f84c1ebc50ef5b07b400e3055b9
-
SHA1
ff1d521cd7e28db6a80fcb6a0937eab2efba8292
-
SHA256
ba4e656f1e01be59a74dd10864d9bc50d9add5647c2d860a6d1ad183008a39fb
-
SHA512
ba65999a790f0c76e315e023e69a1d748187ce1f7b4a68ab34618df97265dc5b16663251dcec14b6ee5bcb825094fba8049c088f9ae150edaf8fa62bf6c7fdfb
-
SSDEEP
768:Fuu11TwQsOnFWUFN1/mo2qD60YFK8oubbbQtTk/nPIAdzjbigX3iyX72osKkPNDo:Fuu11TwSb22YnctTiAAd3bFXSS72osKP
Behavioral task
behavioral1
Sample
bundy.exe
Resource
win7-20241023-en
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:1604
76neALhoLeyJ
-
delay
3
-
install
true
-
install_file
bundy.exe
-
install_folder
%AppData%
Targets
-
-
Target
bundy.exe
-
Size
45KB
-
MD5
7f6f0f84c1ebc50ef5b07b400e3055b9
-
SHA1
ff1d521cd7e28db6a80fcb6a0937eab2efba8292
-
SHA256
ba4e656f1e01be59a74dd10864d9bc50d9add5647c2d860a6d1ad183008a39fb
-
SHA512
ba65999a790f0c76e315e023e69a1d748187ce1f7b4a68ab34618df97265dc5b16663251dcec14b6ee5bcb825094fba8049c088f9ae150edaf8fa62bf6c7fdfb
-
SSDEEP
768:Fuu11TwQsOnFWUFN1/mo2qD60YFK8oubbbQtTk/nPIAdzjbigX3iyX72osKkPNDo:Fuu11TwSb22YnctTiAAd3bFXSS72osKP
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-