General

  • Target

    TM.exe

  • Size

    175KB

  • Sample

    230525-t4n53sbh8y

  • MD5

    4f52dae15e37c52c33d49702e3cba0ef

  • SHA1

    e80df93bcaa8f2f4629c8934919814949a525270

  • SHA256

    dae7770b57f5f210c7bfcc8056ce466496fb9530c134663ac11f9d98e03af889

  • SHA512

    6a4080b33e405d65b99f167c91992b079bfbc61a4347bc99c7abd7bd1cf8e6d12503d94697a2096d22643996b5b9ae1e4b2a4dccb93ef1d0cc538d7236a7c3b0

  • SSDEEP

    3072:7e8oX8Sb5KcXrtkkXmf/bDsvqtU+lLToChAP0UZ0b2gTKwAqE+Wpor:mXtb5KcXr7XmfgqtjhAxZ0b2j

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6178725122:AAEGN1XZdL_rGbko9WTpxHNIJyebVBPQfq0/sendMessage?chat_id=944554218

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      TM.exe

    • Size

      175KB

    • MD5

      4f52dae15e37c52c33d49702e3cba0ef

    • SHA1

      e80df93bcaa8f2f4629c8934919814949a525270

    • SHA256

      dae7770b57f5f210c7bfcc8056ce466496fb9530c134663ac11f9d98e03af889

    • SHA512

      6a4080b33e405d65b99f167c91992b079bfbc61a4347bc99c7abd7bd1cf8e6d12503d94697a2096d22643996b5b9ae1e4b2a4dccb93ef1d0cc538d7236a7c3b0

    • SSDEEP

      3072:7e8oX8Sb5KcXrtkkXmf/bDsvqtU+lLToChAP0UZ0b2gTKwAqE+Wpor:mXtb5KcXr7XmfgqtjhAxZ0b2j

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Async RAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v6

Tasks