General
-
Target
Builder.exe
-
Size
7.1MB
-
Sample
240802-kmj1csybnb
-
MD5
479c20170f53c96f24c77610b86fa352
-
SHA1
99c1c05a229e9b2e6f812f0fa7db4ac78c9cae1e
-
SHA256
df814ecf5dd2f631b9b728148c00ba2973b6efbb06364c5a4f0883ddad2549ea
-
SHA512
1c6a7e336f64283dfd2ebb3c259f84bd87f32d7d70d8783e11b45878677c3e95b45c9e7f73ae2c77d3860f95bf6cb85bf85e4fe3ca1d311f9cf153d642f27d61
-
SSDEEP
196608:Zmx49UBA1HeT39Iig/f1ncKOVVtk7HdGtQbNPUQ:0aT1+TtIio0VQ9G6r
Behavioral task
behavioral1
Sample
Builder.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6758433214:AAHsOKdFy4qDz6vRHO6UQUpRG85G-wZvC1Y/sendMessage?chat_id=6234857847
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Builder.exe
-
Size
7.1MB
-
MD5
479c20170f53c96f24c77610b86fa352
-
SHA1
99c1c05a229e9b2e6f812f0fa7db4ac78c9cae1e
-
SHA256
df814ecf5dd2f631b9b728148c00ba2973b6efbb06364c5a4f0883ddad2549ea
-
SHA512
1c6a7e336f64283dfd2ebb3c259f84bd87f32d7d70d8783e11b45878677c3e95b45c9e7f73ae2c77d3860f95bf6cb85bf85e4fe3ca1d311f9cf153d642f27d61
-
SSDEEP
196608:Zmx49UBA1HeT39Iig/f1ncKOVVtk7HdGtQbNPUQ:0aT1+TtIio0VQ9G6r
-
StormKitty payload
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1