General
-
Target
296537d00f440416201747eb37088b44865c06fa512923f922520cad5530772d
-
Size
877KB
-
Sample
240417-samvgsee6z
-
MD5
431a395c6dc42b075fafc5ef0f30472b
-
SHA1
d5241ad378413109ef314953d7d1f7bfa7e72427
-
SHA256
296537d00f440416201747eb37088b44865c06fa512923f922520cad5530772d
-
SHA512
65b134e770b686c2c7adeadb87c9309648f6da1f8a7ddb15ae51ebbeb6a590f57a8a84aa540afb99bafdab589c50842122d0e48e623e0430dcb1c3ebca20d36e
-
SSDEEP
24576:OWe07+hsoB31J4HNj2H1apucMPcP5ccLVTRB:ywgselJW2Hwp15cAVTRB
Static task
static1
Behavioral task
behavioral1
Sample
d5957803eb8a1c83dd84f7d08d431c9ad3a7e3c29814f8b46b805083f5b4899a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5957803eb8a1c83dd84f7d08d431c9ad3a7e3c29814f8b46b805083f5b4899a.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6889241853:AAHAa8eUBd5h6tWRG0OvgDx7o1_LKQJi-y8/sendMessage?chat_id=6367688286
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
d5957803eb8a1c83dd84f7d08d431c9ad3a7e3c29814f8b46b805083f5b4899a.exe
-
Size
1006KB
-
MD5
9b37096274af2542b2e8e5460a32ad92
-
SHA1
fd1bd3fe73844de5f69dfc4b42e9f40aa4395308
-
SHA256
d5957803eb8a1c83dd84f7d08d431c9ad3a7e3c29814f8b46b805083f5b4899a
-
SHA512
2297155b35eadd6d0fcad613d954558f116c9ff660ce7470f428123a99840747056e8648d51c31b86ccd900ace9075f4888e47dd9cac8dc228f40c21e49de994
-
SSDEEP
24576:2TbBv5rUDKoU7LEoW9MZBGa6mXcqIAXiAZfzI6l:IBUUPEjKGLAXiAZz
Score10/10-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-