General

  • Target

    WorldWindClient.exe

  • Size

    170KB

  • Sample

    240812-h1ayhavdnc

  • MD5

    d72548d2438f524ed8ef0bfecd9f9648

  • SHA1

    fd90c2bbff083e48d9b35a4301cb34b2985dd82d

  • SHA256

    1f65a0e05f395d15e1f8abce4088f754b9298bed46e0adec52d3968699a60d32

  • SHA512

    689be9bf13fbf7aa7c42f9733051b8cba0807086a1f8ab3337152930a37b70fa6dbae483f16fd931c99dfa5c30ee42942f8b6270d4e9598ba94f9fa87d34c68e

  • SSDEEP

    3072:++STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cBWH7Xy6+Wp7:j8XN6W8mmHPtppXPSi9b4W

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7141308019:AAFvbuyi4cX6OCqTVfOYVARrVfYTpen7uoA/sendMessage?chat_id=6234857847

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      WorldWindClient.exe

    • Size

      170KB

    • MD5

      d72548d2438f524ed8ef0bfecd9f9648

    • SHA1

      fd90c2bbff083e48d9b35a4301cb34b2985dd82d

    • SHA256

      1f65a0e05f395d15e1f8abce4088f754b9298bed46e0adec52d3968699a60d32

    • SHA512

      689be9bf13fbf7aa7c42f9733051b8cba0807086a1f8ab3337152930a37b70fa6dbae483f16fd931c99dfa5c30ee42942f8b6270d4e9598ba94f9fa87d34c68e

    • SSDEEP

      3072:++STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cBWH7Xy6+Wp7:j8XN6W8mmHPtppXPSi9b4W

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks