General
-
Target
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe
-
Size
170KB
-
Sample
220405-azqnkaaecm
-
MD5
7a43bf93d5c1df0289e57152105162c9
-
SHA1
3abb60159200859e3e22babcf12479766f7b0f78
-
SHA256
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab
-
SHA512
4b8babe45c349cbcdaf7ec40d0a064f5b8f9a74dafc3a1d4583666b3fa857e148a4cdcc4a0851f73fa92b9cee8425a95413cf9833e7eca6bb0ab7ed0f91eb48f
Static task
static1
Behavioral task
behavioral1
Sample
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe
Resource
win7-20220331-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5247464974:AAE4nAxJ7vaD4mfWmY-bGuO23tZg_Mi9B4I/sendMessage?chat_id=736679240
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe
-
Size
170KB
-
MD5
7a43bf93d5c1df0289e57152105162c9
-
SHA1
3abb60159200859e3e22babcf12479766f7b0f78
-
SHA256
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab
-
SHA512
4b8babe45c349cbcdaf7ec40d0a064f5b8f9a74dafc3a1d4583666b3fa857e148a4cdcc4a0851f73fa92b9cee8425a95413cf9833e7eca6bb0ab7ed0f91eb48f
-
StormKitty Payload
-
suricata: ET MALWARE StormKitty Data Exfil via Telegram
suricata: ET MALWARE StormKitty Data Exfil via Telegram
-
Async RAT payload
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-