General

  • Target

    296537d00f440416201747eb37088b44865c06fa512923f922520cad5530772d

  • Size

    877KB

  • Sample

    240417-samvgsee6z

  • MD5

    431a395c6dc42b075fafc5ef0f30472b

  • SHA1

    d5241ad378413109ef314953d7d1f7bfa7e72427

  • SHA256

    296537d00f440416201747eb37088b44865c06fa512923f922520cad5530772d

  • SHA512

    65b134e770b686c2c7adeadb87c9309648f6da1f8a7ddb15ae51ebbeb6a590f57a8a84aa540afb99bafdab589c50842122d0e48e623e0430dcb1c3ebca20d36e

  • SSDEEP

    24576:OWe07+hsoB31J4HNj2H1apucMPcP5ccLVTRB:ywgselJW2Hwp15cAVTRB

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6889241853:AAHAa8eUBd5h6tWRG0OvgDx7o1_LKQJi-y8/sendMessage?chat_id=6367688286

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      d5957803eb8a1c83dd84f7d08d431c9ad3a7e3c29814f8b46b805083f5b4899a.exe

    • Size

      1006KB

    • MD5

      9b37096274af2542b2e8e5460a32ad92

    • SHA1

      fd1bd3fe73844de5f69dfc4b42e9f40aa4395308

    • SHA256

      d5957803eb8a1c83dd84f7d08d431c9ad3a7e3c29814f8b46b805083f5b4899a

    • SHA512

      2297155b35eadd6d0fcad613d954558f116c9ff660ce7470f428123a99840747056e8648d51c31b86ccd900ace9075f4888e47dd9cac8dc228f40c21e49de994

    • SSDEEP

      24576:2TbBv5rUDKoU7LEoW9MZBGa6mXcqIAXiAZfzI6l:IBUUPEjKGLAXiAZz

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Discovery

Query Registry

2
T1012

System Information Discovery

4
T1082

Tasks