General
-
Target
3b77fc7d12019bc24bd450fbe3ebe0974544368414ab054d537142582f7774e5
-
Size
175KB
-
Sample
240827-lfm9wawakr
-
MD5
abee116f42cc73e0bd8a02608b8224df
-
SHA1
c36f5bda776e9a8a01a8556aea006c95f3d70e95
-
SHA256
3b77fc7d12019bc24bd450fbe3ebe0974544368414ab054d537142582f7774e5
-
SHA512
1c9ad8264de381d6d919d8c97d9f8b7227a5aacc2c74853e99918d1399f9fa9ec0bc59caf4315750d614a5d5bcbe4231c3e3093d0e20492a35f7b7d1be608dda
-
SSDEEP
3072:ve8p6ewdOIwQx76vK/bvTv0cU+lL/dMlZZUZ0b2gTgwARE+WpCc:n6ewwIwQJ6vKX0c5MlYZ0b2p
Behavioral task
behavioral1
Sample
3b77fc7d12019bc24bd450fbe3ebe0974544368414ab054d537142582f7774e5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
3b77fc7d12019bc24bd450fbe3ebe0974544368414ab054d537142582f7774e5.exe
Resource
win11-20240802-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7378183396:AAFibFQyRQG8tKluIcmEWqT_Rb47MNTfleQ/sendMessage?chat_id=5795480469
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
3b77fc7d12019bc24bd450fbe3ebe0974544368414ab054d537142582f7774e5
-
Size
175KB
-
MD5
abee116f42cc73e0bd8a02608b8224df
-
SHA1
c36f5bda776e9a8a01a8556aea006c95f3d70e95
-
SHA256
3b77fc7d12019bc24bd450fbe3ebe0974544368414ab054d537142582f7774e5
-
SHA512
1c9ad8264de381d6d919d8c97d9f8b7227a5aacc2c74853e99918d1399f9fa9ec0bc59caf4315750d614a5d5bcbe4231c3e3093d0e20492a35f7b7d1be608dda
-
SSDEEP
3072:ve8p6ewdOIwQx76vK/bvTv0cU+lL/dMlZZUZ0b2gTgwARE+WpCc:n6ewwIwQJ6vKX0c5MlYZ0b2p
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1