General
-
Target
tmp
-
Size
1.4MB
-
Sample
230507-vk4bbsha6s
-
MD5
1c52b6b7aa217dcaa92d37a48a6ea314
-
SHA1
8b48635aecd796d8b77ebe51f9003fc7f2517af3
-
SHA256
762190c15f63a6edbc075ac9ce0ce9e9713a28a9a2efa795767b0256591854ce
-
SHA512
9cd60c2d287e22a6a8e198ba82f894cf48f507826324ec11d1c1855df69a5cde07ab1f4439c1c32f6e3eb8705730417ff13689de7dbdd8909bc2447967e1b706
-
SSDEEP
24576:DTbBv5rUDwcyw2ZJtxRCDKvMrBW4eNTygt90e+hoyaxlB:dB1cL2jtxrvMr8jygt+0B
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
tmp
-
Size
1.4MB
-
MD5
1c52b6b7aa217dcaa92d37a48a6ea314
-
SHA1
8b48635aecd796d8b77ebe51f9003fc7f2517af3
-
SHA256
762190c15f63a6edbc075ac9ce0ce9e9713a28a9a2efa795767b0256591854ce
-
SHA512
9cd60c2d287e22a6a8e198ba82f894cf48f507826324ec11d1c1855df69a5cde07ab1f4439c1c32f6e3eb8705730417ff13689de7dbdd8909bc2447967e1b706
-
SSDEEP
24576:DTbBv5rUDwcyw2ZJtxRCDKvMrBW4eNTygt90e+hoyaxlB:dB1cL2jtxrvMr8jygt+0B
Score10/10-
StormKitty payload
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-