General
-
Target
Swift-PaymentInvoice20220331_pdf.exe
-
Size
520KB
-
Sample
220404-ytqy5sbhd2
-
MD5
72a9bcce9a210198f0d6a679b5bca7e4
-
SHA1
d19326cef0a76c63343fb2a762331639ed6617c2
-
SHA256
407f8e8ab8d4141df81d49cbb94e54ec89c80cd76ca0fa23b1bb2aa0ba74b0dc
-
SHA512
ec190a3a1a887f8c4cd4863c671c5da20cc24ce6cb3ed14320a07e8e0318da7833bf882843175ea6cfe29a333839adca6f2bf4c606cba2ba0a7a012bb27824c6
Static task
static1
Behavioral task
behavioral1
Sample
Swift-PaymentInvoice20220331_pdf.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
Swift-PaymentInvoice20220331_pdf.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5247464974:AAE4nAxJ7vaD4mfWmY-bGuO23tZg_Mi9B4I/sendMessage?chat_id=736679240
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Swift-PaymentInvoice20220331_pdf.exe
-
Size
520KB
-
MD5
72a9bcce9a210198f0d6a679b5bca7e4
-
SHA1
d19326cef0a76c63343fb2a762331639ed6617c2
-
SHA256
407f8e8ab8d4141df81d49cbb94e54ec89c80cd76ca0fa23b1bb2aa0ba74b0dc
-
SHA512
ec190a3a1a887f8c4cd4863c671c5da20cc24ce6cb3ed14320a07e8e0318da7833bf882843175ea6cfe29a333839adca6f2bf4c606cba2ba0a7a012bb27824c6
-
StormKitty Payload
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-