General
-
Target
c.exe
-
Size
214KB
-
Sample
230719-ht8wysgd57
-
MD5
7007e1d06387b6ca204c98d49c7b07da
-
SHA1
5fb072d40016d80fed82631f20284b3672b2f965
-
SHA256
6abc7310211473a511a9e776b103c520d4a49ff7a400c222160af4ae0288a916
-
SHA512
ef3ca82efb87a0d395b2d0c8520a555eb7027bdb20cfa1932bb557a0323ded994f6bdf13bd020eaaa2b41a628edc4930c301884e79110ff5b3995b95bf5302ff
-
SSDEEP
6144:KZiai3mTU41O2oV1mD6ArKAenI3YNGDaXCF:KwZWp1OnV0+YKa3ApCF
Static task
static1
Behavioral task
behavioral1
Sample
c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c.exe
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
c.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6268035721:AAGWwn3ukkEumLQ0BZ43K9ZyUfUcyiD2wF0/sendMessage?chat_id=6119127555
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
C:\Users\Admin\Contacts\HELP_DECRYPT_YOUR_FILES.txt
Extracted
C:\Users\Admin\Contacts\HELP_DECRYPT_YOUR_FILES.txt
Extracted
C:\Users\Admin\Contacts\HELP_DECRYPT_YOUR_FILES.txt
Targets
-
-
Target
c.exe
-
Size
214KB
-
MD5
7007e1d06387b6ca204c98d49c7b07da
-
SHA1
5fb072d40016d80fed82631f20284b3672b2f965
-
SHA256
6abc7310211473a511a9e776b103c520d4a49ff7a400c222160af4ae0288a916
-
SHA512
ef3ca82efb87a0d395b2d0c8520a555eb7027bdb20cfa1932bb557a0323ded994f6bdf13bd020eaaa2b41a628edc4930c301884e79110ff5b3995b95bf5302ff
-
SSDEEP
6144:KZiai3mTU41O2oV1mD6ArKAenI3YNGDaXCF:KwZWp1OnV0+YKa3ApCF
-
StormKitty payload
-
Async RAT payload
-
Renames multiple (66) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-