General
-
Target
0a8fe4d8b13e9cb811bf9985b89cb0a38ee2e594e705a0b366d80e55a3d6f5a4.exe
-
Size
210KB
-
Sample
240726-qpefjstfqe
-
MD5
08adca5907849bca41a607e62864cd4a
-
SHA1
7c7be1451cf7175923139990572470b3fceef9d7
-
SHA256
0a8fe4d8b13e9cb811bf9985b89cb0a38ee2e594e705a0b366d80e55a3d6f5a4
-
SHA512
00c121b25f04eba9471abfc8cdf9a63fa5fc6e991d5086cda53245315104831bcddc763d5fba6a9744bf4aaee0829484365ae2e8652c4b01639a798b981ec360
-
SSDEEP
3072:sr85Cezj8mZw0YaeiJFqIPu/i9bVJ2cxO06+WpzIz+STW8djpN6x:k9K8mm0YmfXPSi9bDDy8XN6x
Behavioral task
behavioral1
Sample
0a8fe4d8b13e9cb811bf9985b89cb0a38ee2e594e705a0b366d80e55a3d6f5a4.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0a8fe4d8b13e9cb811bf9985b89cb0a38ee2e594e705a0b366d80e55a3d6f5a4.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
0a8fe4d8b13e9cb811bf9985b89cb0a38ee2e594e705a0b366d80e55a3d6f5a4.exe
-
Size
210KB
-
MD5
08adca5907849bca41a607e62864cd4a
-
SHA1
7c7be1451cf7175923139990572470b3fceef9d7
-
SHA256
0a8fe4d8b13e9cb811bf9985b89cb0a38ee2e594e705a0b366d80e55a3d6f5a4
-
SHA512
00c121b25f04eba9471abfc8cdf9a63fa5fc6e991d5086cda53245315104831bcddc763d5fba6a9744bf4aaee0829484365ae2e8652c4b01639a798b981ec360
-
SSDEEP
3072:sr85Cezj8mZw0YaeiJFqIPu/i9bVJ2cxO06+WpzIz+STW8djpN6x:k9K8mm0YmfXPSi9bDDy8XN6x
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
StormKitty payload
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1