General
-
Target
a0.exe
-
Size
170KB
-
Sample
230322-rpj7gabb5z
-
MD5
a0ce182a26b24adf936411f4ea796ab7
-
SHA1
a764ea86541665181d7080fe2a2c534a6acc6c5b
-
SHA256
85ca4cd1bdc0b219e0513bca055913d18debf0e6ef752a5814cb9b87af2bd646
-
SHA512
de9db377614cfead6043022d2413d47821cd38dd5e751a6e91d3e37db4965217c92607495e15dcee834afec4fd22490635cd0377ec6f510126bf65dd4824b69b
-
SSDEEP
3072:T+STW8djpN6izj8mZw24FBPBrL2eFcyZlVqIPu/i9bDq2cKk6+Wpn:w8XN6W8mm2anrL2eFcyvVXPSi9b+
Behavioral task
behavioral1
Sample
a0.exe
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5081755732:AAFIzASZTZ42XUhPubF2E6ugH8B5BoBq2GY/sendMessage?chat_id=1184265544
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
a0.exe
-
Size
170KB
-
MD5
a0ce182a26b24adf936411f4ea796ab7
-
SHA1
a764ea86541665181d7080fe2a2c534a6acc6c5b
-
SHA256
85ca4cd1bdc0b219e0513bca055913d18debf0e6ef752a5814cb9b87af2bd646
-
SHA512
de9db377614cfead6043022d2413d47821cd38dd5e751a6e91d3e37db4965217c92607495e15dcee834afec4fd22490635cd0377ec6f510126bf65dd4824b69b
-
SSDEEP
3072:T+STW8djpN6izj8mZw24FBPBrL2eFcyZlVqIPu/i9bDq2cKk6+Wpn:w8XN6W8mm2anrL2eFcyvVXPSi9b+
-
StormKitty payload
-
Async RAT payload
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-