General
-
Target
WorldWindClient.exe
-
Size
170KB
-
Sample
240812-h1ayhavdnc
-
MD5
d72548d2438f524ed8ef0bfecd9f9648
-
SHA1
fd90c2bbff083e48d9b35a4301cb34b2985dd82d
-
SHA256
1f65a0e05f395d15e1f8abce4088f754b9298bed46e0adec52d3968699a60d32
-
SHA512
689be9bf13fbf7aa7c42f9733051b8cba0807086a1f8ab3337152930a37b70fa6dbae483f16fd931c99dfa5c30ee42942f8b6270d4e9598ba94f9fa87d34c68e
-
SSDEEP
3072:++STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cBWH7Xy6+Wp7:j8XN6W8mmHPtppXPSi9b4W
Behavioral task
behavioral1
Sample
WorldWindClient.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WorldWindClient.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7141308019:AAFvbuyi4cX6OCqTVfOYVARrVfYTpen7uoA/sendMessage?chat_id=6234857847
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
WorldWindClient.exe
-
Size
170KB
-
MD5
d72548d2438f524ed8ef0bfecd9f9648
-
SHA1
fd90c2bbff083e48d9b35a4301cb34b2985dd82d
-
SHA256
1f65a0e05f395d15e1f8abce4088f754b9298bed46e0adec52d3968699a60d32
-
SHA512
689be9bf13fbf7aa7c42f9733051b8cba0807086a1f8ab3337152930a37b70fa6dbae483f16fd931c99dfa5c30ee42942f8b6270d4e9598ba94f9fa87d34c68e
-
SSDEEP
3072:++STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cBWH7Xy6+Wp7:j8XN6W8mmHPtppXPSi9b4W
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1