General
-
Target
1006.exe
-
Size
225KB
-
Sample
230630-n4lgashe67
-
MD5
883784a3500e2389e6e1816696dba87b
-
SHA1
f4364ff100c016d5cf78a3a4e3bedb287555f2ce
-
SHA256
0373eb783358fbf3b810fe1156efffd5847913c62db0e6c690e802300a5640ab
-
SHA512
f5d4d508dfeee159d339b9833d8128a6486b866639cd5dcba381b873188c3a6e643961477e723e38d100c3a5b47b0c83499e18504b1a6e5f5e68a73bf01e73f3
-
SSDEEP
3072:/+STW8djpN6izj8mZwgWDZ5IRN9MBQVahUbBEgDzazaLEV55NlmwXcFOC+UX6+WO:08XN6W8mmgqQMhUbOKEV55NlXkOI
Behavioral task
behavioral1
Sample
1006.exe
Resource
win7-20230621-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6154715708:AAHDKp_4g6Ye1lnxUlsJvFSuNl2Zm6A__-E/sendMessage?chat_id=1165040754
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
1006.exe
-
Size
225KB
-
MD5
883784a3500e2389e6e1816696dba87b
-
SHA1
f4364ff100c016d5cf78a3a4e3bedb287555f2ce
-
SHA256
0373eb783358fbf3b810fe1156efffd5847913c62db0e6c690e802300a5640ab
-
SHA512
f5d4d508dfeee159d339b9833d8128a6486b866639cd5dcba381b873188c3a6e643961477e723e38d100c3a5b47b0c83499e18504b1a6e5f5e68a73bf01e73f3
-
SSDEEP
3072:/+STW8djpN6izj8mZwgWDZ5IRN9MBQVahUbBEgDzazaLEV55NlmwXcFOC+UX6+WO:08XN6W8mmgqQMhUbOKEV55NlXkOI
-
StormKitty payload
-
Async RAT payload
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory
-