General
-
Target
Server.exe
-
Size
175KB
-
Sample
240622-aj3m7axejd
-
MD5
93f59dfbc510724cd813a4932c940288
-
SHA1
b36c6fdedcde70cbbbc8ac1d2c525f6720a71695
-
SHA256
e709b46999c2c10f2b7c29de74d47ba866dbe3e119305a6a74b607a64c4a3ac6
-
SHA512
393abe5312933948a7be05ca88f9e370862753a94a01478b6c8b57d1f4b031097b3a41dfdb43578526491d3b9ee8bfac6ff1c20bc989fed61294361adf177bc9
-
SSDEEP
3072:xe8oX8Sb5KcXrtkkXmf/bDsvqtU+lLToChAP4UZ0b2gT+wAqE+Wpor:kXtb5KcXr7XmfgqtjhANZ0b2j
Behavioral task
behavioral1
Sample
Server.exe
Resource
win10-20240404-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6950741702:AAF78ePT60gAVVIZ2a5FAUMt-KJuetn8Rcg/sendMessage?chat_id=1914235059
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Server.exe
-
Size
175KB
-
MD5
93f59dfbc510724cd813a4932c940288
-
SHA1
b36c6fdedcde70cbbbc8ac1d2c525f6720a71695
-
SHA256
e709b46999c2c10f2b7c29de74d47ba866dbe3e119305a6a74b607a64c4a3ac6
-
SHA512
393abe5312933948a7be05ca88f9e370862753a94a01478b6c8b57d1f4b031097b3a41dfdb43578526491d3b9ee8bfac6ff1c20bc989fed61294361adf177bc9
-
SSDEEP
3072:xe8oX8Sb5KcXrtkkXmf/bDsvqtU+lLToChAP4UZ0b2gT+wAqE+Wpor:kXtb5KcXr7XmfgqtjhANZ0b2j
-
StormKitty payload
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-