General

  • Target

    BootstrapperV2.09(rat).exe

  • Size

    5.9MB

  • Sample

    250101-w33m7axlgv

  • MD5

    bbe4425a7b91d830ae36203ce3660a19

  • SHA1

    147d8f6cd4b7694a6274cde567b4b94c51bc3b3a

  • SHA256

    f65b4ac5a2e3791b5851ff09840e334a51169cee78a5c383f956cc11e912ece6

  • SHA512

    a4e1957b5a829bd6a833fca9616e790f6fc976c35bc6110f259142415593a0369e5dc6ec45e3dc72b1ea3776d7a999beb77b80d80c36684391412e8beb4425e9

  • SSDEEP

    98304:Voqb1QHJ2we9het0Un2reIgLxmqMBfiGJRkZqtVwCYWoOacfHM26PbF8qz16B8BB:VoMIJJeCwaxmZBfiGJRkZqtGCYTQMXF7

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

51.89.44.68:8848

Mutex

etb3t1tr5n

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7674843264:AAGzWOldtG3GqsZObUVSOc6rpPUp0jvoUtc/getM

https://api.telegram.org/bot7674843264:AAGzWOldtG3GqsZObUVSOc6rpPUp0jvoUtc/sendMessage?chat_id=-1002262935377

Targets

    • Target

      BootstrapperV2.09(rat).exe

    • Size

      5.9MB

    • MD5

      bbe4425a7b91d830ae36203ce3660a19

    • SHA1

      147d8f6cd4b7694a6274cde567b4b94c51bc3b3a

    • SHA256

      f65b4ac5a2e3791b5851ff09840e334a51169cee78a5c383f956cc11e912ece6

    • SHA512

      a4e1957b5a829bd6a833fca9616e790f6fc976c35bc6110f259142415593a0369e5dc6ec45e3dc72b1ea3776d7a999beb77b80d80c36684391412e8beb4425e9

    • SSDEEP

      98304:Voqb1QHJ2we9het0Un2reIgLxmqMBfiGJRkZqtVwCYWoOacfHM26PbF8qz16B8BB:VoMIJJeCwaxmZBfiGJRkZqtGCYTQMXF7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Async RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks