General
-
Target
instagram 0day.dontrun
-
Size
170KB
-
Sample
230324-prbxrsec72
-
MD5
4d2538cac244ad3f315436c6fbe2f12f
-
SHA1
67b671bcda3c13e7b085378f7dfc766fe15bec18
-
SHA256
163b9785fdeb5b8e317e5d651e2e3bccf244f864921574dc4c73281389cbce82
-
SHA512
46170ad6b178cc61a5b6dd07eccfc4f2d5e379eb97266289f85e3b07fb85ea12e08104a42ca7af7bdc3065862b5f482039342d5dbe8b9eb8c06ad7ff8f87fbdd
-
SSDEEP
3072:++STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cwtEL6+Wp7:j8XN6W8mmHPtppXPSi9b44E
Behavioral task
behavioral1
Sample
instagram 0day.exe
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5636417446:AAGa4gvWAKcDCv7f9c8u42_399xKPfEkUlQ/sendMessage?chat_id=5331885311
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
instagram 0day.dontrun
-
Size
170KB
-
MD5
4d2538cac244ad3f315436c6fbe2f12f
-
SHA1
67b671bcda3c13e7b085378f7dfc766fe15bec18
-
SHA256
163b9785fdeb5b8e317e5d651e2e3bccf244f864921574dc4c73281389cbce82
-
SHA512
46170ad6b178cc61a5b6dd07eccfc4f2d5e379eb97266289f85e3b07fb85ea12e08104a42ca7af7bdc3065862b5f482039342d5dbe8b9eb8c06ad7ff8f87fbdd
-
SSDEEP
3072:++STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cwtEL6+Wp7:j8XN6W8mmHPtppXPSi9b44E
-
StormKitty payload
-
Async RAT payload
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-