General
-
Target
e23d0a4651d9313e5b46ef7a14aad2ef.exe
-
Size
170KB
-
Sample
230628-r31flsaa55
-
MD5
e23d0a4651d9313e5b46ef7a14aad2ef
-
SHA1
4fdddd186d06c6c79a1f50409dc1aed3fa0f13d1
-
SHA256
72b60597a7e9fed89d9b5383f6b4bc331fb0416795f17cddc1a3c32e15d50691
-
SHA512
882ad9a46edf720d78242788dc82830a73b85050990993b94fc2a77c6c2feaa68569c6dbb0c42da9ffd744ed4e45330435a3527777c4b296392c2e49065e212b
-
SSDEEP
3072:G+STW8djpN6izj8mZw+GSv5hqIPu/i9bcJ2cwp6+WpD:b8XN6W8mm+vvnXPSi9b4+
Behavioral task
behavioral1
Sample
e23d0a4651d9313e5b46ef7a14aad2ef.exe
Resource
win7-20230621-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6154715708:AAHVX9D43hLAOXSm2JG6HA3z4wqn-qeyK6Y/sendMessage?chat_id=1165040754
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
e23d0a4651d9313e5b46ef7a14aad2ef.exe
-
Size
170KB
-
MD5
e23d0a4651d9313e5b46ef7a14aad2ef
-
SHA1
4fdddd186d06c6c79a1f50409dc1aed3fa0f13d1
-
SHA256
72b60597a7e9fed89d9b5383f6b4bc331fb0416795f17cddc1a3c32e15d50691
-
SHA512
882ad9a46edf720d78242788dc82830a73b85050990993b94fc2a77c6c2feaa68569c6dbb0c42da9ffd744ed4e45330435a3527777c4b296392c2e49065e212b
-
SSDEEP
3072:G+STW8djpN6izj8mZw+GSv5hqIPu/i9bcJ2cwp6+WpD:b8XN6W8mm+vvnXPSi9b4+
-
StormKitty payload
-
Async RAT payload
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-