General
-
Target
Hik Bruteforce v2.exe
-
Size
170KB
-
Sample
240823-qwqgdszbjr
-
MD5
3a7eef4a84aed62a508f6a4b7dee2c84
-
SHA1
6f8cd821581de3337d2e15b35519430f77b1413a
-
SHA256
24df78e691e9cfa6b363d97d9cf120d1e4d1de0d2f63d1998bf375924eb04a94
-
SHA512
09e159e8091fcf9870d7f2bc9f95a3177b7dad608a8a95160cd12d214de72f7933cd3aca489c72079a544eab4ebd6b137aae2d4f4aa7e99a1c2495da0d0a03e3
-
SSDEEP
3072:T+STW8djpN6izj8mZwtJZ8yWmRIPu/i9bNJ2cJ6V6+Wpn:w8XN6W8mmtUy7KPSi9bL2
Behavioral task
behavioral1
Sample
Hik Bruteforce v2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Hik Bruteforce v2.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7011456348:AAFxhHntxKAFnfPPOKU15CPsYvWSR2BNXdg/sendMessage?chat_id=6528052400
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Hik Bruteforce v2.exe
-
Size
170KB
-
MD5
3a7eef4a84aed62a508f6a4b7dee2c84
-
SHA1
6f8cd821581de3337d2e15b35519430f77b1413a
-
SHA256
24df78e691e9cfa6b363d97d9cf120d1e4d1de0d2f63d1998bf375924eb04a94
-
SHA512
09e159e8091fcf9870d7f2bc9f95a3177b7dad608a8a95160cd12d214de72f7933cd3aca489c72079a544eab4ebd6b137aae2d4f4aa7e99a1c2495da0d0a03e3
-
SSDEEP
3072:T+STW8djpN6izj8mZwtJZ8yWmRIPu/i9bNJ2cJ6V6+Wpn:w8XN6W8mmtUy7KPSi9bL2
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1