General
-
Target
62b6260c98e5afe1c20f7dfb0.exe
-
Size
225KB
-
Sample
230630-n3t22sad4t
-
MD5
62b6260c98e5afe1c20f7dfb031c6cbc
-
SHA1
cea0e62f31a0ab68ceb8fff68d36e8c09e8a9c83
-
SHA256
3163cce36440d2b1cbc265a56298664026d1ddf3885ca0962367028c88d07113
-
SHA512
a634c04fad375dcce6ae88b7a97a99fe5fec2dd10763b1fe4e9330ab2c57c0c17c5102c74f9077e8b346b770cfd98df677f797e49a0fecd882795b014b2a57e5
-
SSDEEP
3072:j+STW8djpN6izj8mZwlsdZ5b4GaBfVaDUbBKfDqRY6RAYnecDQ+g3H1vKx6+Wpw:A8XN6W8mmlKgfMDUbofDq+YnJ
Behavioral task
behavioral1
Sample
62b6260c98e5afe1c20f7dfb0.exe
Resource
win7-20230621-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6154715708:AAGKCDwosu3IuPM9RPnUhnOetL8Sftgqoy0/sendMessage?chat_id=1165040754
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
62b6260c98e5afe1c20f7dfb0.exe
-
Size
225KB
-
MD5
62b6260c98e5afe1c20f7dfb031c6cbc
-
SHA1
cea0e62f31a0ab68ceb8fff68d36e8c09e8a9c83
-
SHA256
3163cce36440d2b1cbc265a56298664026d1ddf3885ca0962367028c88d07113
-
SHA512
a634c04fad375dcce6ae88b7a97a99fe5fec2dd10763b1fe4e9330ab2c57c0c17c5102c74f9077e8b346b770cfd98df677f797e49a0fecd882795b014b2a57e5
-
SSDEEP
3072:j+STW8djpN6izj8mZwlsdZ5b4GaBfVaDUbBKfDqRY6RAYnecDQ+g3H1vKx6+Wpw:A8XN6W8mmlKgfMDUbofDq+YnJ
-
StormKitty payload
-
Async RAT payload
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory
-