General

  • Target

    62b6260c98e5afe1c20f7dfb0.exe

  • Size

    225KB

  • Sample

    230630-n3t22sad4t

  • MD5

    62b6260c98e5afe1c20f7dfb031c6cbc

  • SHA1

    cea0e62f31a0ab68ceb8fff68d36e8c09e8a9c83

  • SHA256

    3163cce36440d2b1cbc265a56298664026d1ddf3885ca0962367028c88d07113

  • SHA512

    a634c04fad375dcce6ae88b7a97a99fe5fec2dd10763b1fe4e9330ab2c57c0c17c5102c74f9077e8b346b770cfd98df677f797e49a0fecd882795b014b2a57e5

  • SSDEEP

    3072:j+STW8djpN6izj8mZwlsdZ5b4GaBfVaDUbBKfDqRY6RAYnecDQ+g3H1vKx6+Wpw:A8XN6W8mmlKgfMDUbofDq+YnJ

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6154715708:AAGKCDwosu3IuPM9RPnUhnOetL8Sftgqoy0/sendMessage?chat_id=1165040754

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      62b6260c98e5afe1c20f7dfb0.exe

    • Size

      225KB

    • MD5

      62b6260c98e5afe1c20f7dfb031c6cbc

    • SHA1

      cea0e62f31a0ab68ceb8fff68d36e8c09e8a9c83

    • SHA256

      3163cce36440d2b1cbc265a56298664026d1ddf3885ca0962367028c88d07113

    • SHA512

      a634c04fad375dcce6ae88b7a97a99fe5fec2dd10763b1fe4e9330ab2c57c0c17c5102c74f9077e8b346b770cfd98df677f797e49a0fecd882795b014b2a57e5

    • SSDEEP

      3072:j+STW8djpN6izj8mZwlsdZ5b4GaBfVaDUbBKfDqRY6RAYnecDQ+g3H1vKx6+Wpw:A8XN6W8mmlKgfMDUbofDq+YnJ

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Async RAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks