General
-
Target
CorkDork.rar
-
Size
1.4MB
-
Sample
240812-lrwemavhnq
-
MD5
dde20123f0b1bd59535d6e2ca1a6854d
-
SHA1
df3ea59aefad63e744a2aba4f8ddb27cff05367f
-
SHA256
10342e9572946deff266cab155dd43234e8882d4aaa08d4d8354f2ae7f730697
-
SHA512
a4a31aa450aad63bf7694e0c345488db83969d81124eb34e90ea2f920199e525486f1206beb7062e07f127ee2127c11b0eb7e0e2c2c80dc541434cdaabc072af
-
SSDEEP
24576:CoY+XGcuUh/x8hSVmth/MsYKLMIBjpxeZ1P5gEkDEtrLaZLJkW75WniSHv:C3+UWx6CmvEjyMYtSXkDGOLJkWSiSP
Behavioral task
behavioral1
Sample
CorkDork/CorkDork.exe
Resource
win10-20240404-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7044437613:AAEXeS1SKGTrEjQ8F-7vSegWo8OLABeJY5k/sendMessage?chat_id=6052812018
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
CorkDork/CorkDork.exe
-
Size
4.3MB
-
MD5
434d06196f5748b654d699347d71ac70
-
SHA1
301f1954d9703a8708ff6b6c54b443fc3da4446f
-
SHA256
ea9375b673a61156feca60e66b8d56968773bcdd890a0584bca96874e27df1c2
-
SHA512
6917d6aeedeaa65cc0025fb61f2b9ae8e2feab66d61cd0328df18966197291afcada6f2c9645eaef077e69ac95820c144bab9de39f899431d1ad9fd3732dab99
-
SSDEEP
49152:2pa1CZHN6Js6n0ejMhChyMaNzynymvbb2zGNCE/q4TEJTMoIB8Zw+AHw2MmU:2rMn/jkkym2MHB+0w2Mm
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
StormKitty payload
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE
-
Modifies system executable filetype association
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1