General
-
Target
8885a16529c6832e1cd77b155de7bc60N.exe
-
Size
7.2MB
-
Sample
240906-qtc4aazbqb
-
MD5
8885a16529c6832e1cd77b155de7bc60
-
SHA1
07491563ffc5bc40f3e0b9748669ba8ba3cd77e3
-
SHA256
4d86f85044737f0ffd39482330ab0175e4f8b29017370326f1fe9abe03815ecc
-
SHA512
95ed36eb1079098972281a91aaf19bff0b14696d532dc5d5049dc59488122a85d9c2fc78b02fc1aa3cf09e1d0f4ab9c6bbb07a68b24c41b30d323bf7cbbd847c
-
SSDEEP
3072:Oe8oX8Sb5KcXrtkkXmf/bDsvqtU+lLToChAP0UZ0b2gT8GwAqE+Wpo7:/Xtb5KcXr7XmfgqtjhAxZ0b2FO
Behavioral task
behavioral1
Sample
8885a16529c6832e1cd77b155de7bc60N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8885a16529c6832e1cd77b155de7bc60N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7098574639:AAFPe7yc2myaqYLQpGxfhbTUYr2bZbUddD0/sendMessage?chat_id=921280047
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
8885a16529c6832e1cd77b155de7bc60N.exe
-
Size
7.2MB
-
MD5
8885a16529c6832e1cd77b155de7bc60
-
SHA1
07491563ffc5bc40f3e0b9748669ba8ba3cd77e3
-
SHA256
4d86f85044737f0ffd39482330ab0175e4f8b29017370326f1fe9abe03815ecc
-
SHA512
95ed36eb1079098972281a91aaf19bff0b14696d532dc5d5049dc59488122a85d9c2fc78b02fc1aa3cf09e1d0f4ab9c6bbb07a68b24c41b30d323bf7cbbd847c
-
SSDEEP
3072:Oe8oX8Sb5KcXrtkkXmf/bDsvqtU+lLToChAP0UZ0b2gT8GwAqE+Wpo7:/Xtb5KcXr7XmfgqtjhAxZ0b2FO
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1