General
-
Target
BootstrapperV2.09(rat).exe
-
Size
5.9MB
-
Sample
250101-wk7t7awnaz
-
MD5
bbe4425a7b91d830ae36203ce3660a19
-
SHA1
147d8f6cd4b7694a6274cde567b4b94c51bc3b3a
-
SHA256
f65b4ac5a2e3791b5851ff09840e334a51169cee78a5c383f956cc11e912ece6
-
SHA512
a4e1957b5a829bd6a833fca9616e790f6fc976c35bc6110f259142415593a0369e5dc6ec45e3dc72b1ea3776d7a999beb77b80d80c36684391412e8beb4425e9
-
SSDEEP
98304:Voqb1QHJ2we9het0Un2reIgLxmqMBfiGJRkZqtVwCYWoOacfHM26PbF8qz16B8BB:VoMIJJeCwaxmZBfiGJRkZqtGCYTQMXF7
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperV2.09(rat).exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
gurcu
https://api.telegram.org/bot7674843264:AAGzWOldtG3GqsZObUVSOc6rpPUp0jvoUtc/getM
https://api.telegram.org/bot7674843264:AAGzWOldtG3GqsZObUVSOc6rpPUp0jvoUtc/sendMessage?chat_id=-1002262935377
Targets
-
-
Target
BootstrapperV2.09(rat).exe
-
Size
5.9MB
-
MD5
bbe4425a7b91d830ae36203ce3660a19
-
SHA1
147d8f6cd4b7694a6274cde567b4b94c51bc3b3a
-
SHA256
f65b4ac5a2e3791b5851ff09840e334a51169cee78a5c383f956cc11e912ece6
-
SHA512
a4e1957b5a829bd6a833fca9616e790f6fc976c35bc6110f259142415593a0369e5dc6ec45e3dc72b1ea3776d7a999beb77b80d80c36684391412e8beb4425e9
-
SSDEEP
98304:Voqb1QHJ2we9het0Un2reIgLxmqMBfiGJRkZqtVwCYWoOacfHM26PbF8qz16B8BB:VoMIJJeCwaxmZBfiGJRkZqtGCYTQMXF7
-
Asyncrat family
-
Gurcu family
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1