General
-
Target
63d2c37fdb370cf6e743bd75e7408f5eded5bc823a29401eeafe0bea921657bb
-
Size
1.7MB
-
Sample
240627-2vv62awemg
-
MD5
b7ca45674c6b8a24a6a71315e0e51397
-
SHA1
79516b1bd2227f08ff333b950dafb29707916828
-
SHA256
63d2c37fdb370cf6e743bd75e7408f5eded5bc823a29401eeafe0bea921657bb
-
SHA512
f390c2d017c041b60c57a67508341512785efbd25cb93a5c2849b4a5adb52931ea92eca7bbbef3e0cae0c919525770582e4c5e2518033c1c61542c0c2c1ebf2f
-
SSDEEP
24576:iRJSuMgl+JTBJ5aB3KoWWbHcXThtehTl5O9TLb:0IEFd/CTqR8P
Static task
static1
Behavioral task
behavioral1
Sample
63d2c37fdb370cf6e743bd75e7408f5eded5bc823a29401eeafe0bea921657bb.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63d2c37fdb370cf6e743bd75e7408f5eded5bc823a29401eeafe0bea921657bb.exe
Resource
win10-20240404-en
Malware Config
Extracted
njrat
im523
HacKed
194.26.192.92:5552
3c34302470a14b537cf05fcc9ade517d
-
reg_key
3c34302470a14b537cf05fcc9ade517d
-
splitter
|'|'|
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7095863454:AAFGhBQqJXY7rFzi0CT99qZPVRwQpKI6R1A/sendMessage?chat_id=7257613869
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
63d2c37fdb370cf6e743bd75e7408f5eded5bc823a29401eeafe0bea921657bb
-
Size
1.7MB
-
MD5
b7ca45674c6b8a24a6a71315e0e51397
-
SHA1
79516b1bd2227f08ff333b950dafb29707916828
-
SHA256
63d2c37fdb370cf6e743bd75e7408f5eded5bc823a29401eeafe0bea921657bb
-
SHA512
f390c2d017c041b60c57a67508341512785efbd25cb93a5c2849b4a5adb52931ea92eca7bbbef3e0cae0c919525770582e4c5e2518033c1c61542c0c2c1ebf2f
-
SSDEEP
24576:iRJSuMgl+JTBJ5aB3KoWWbHcXThtehTl5O9TLb:0IEFd/CTqR8P
-
StormKitty payload
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-