General
-
Target
PasteHook.exe
-
Size
19KB
-
Sample
240910-xmd6bszbkq
-
MD5
2d6eec7c4e6fa137078f28fb192c4578
-
SHA1
7fc20709c0b346263b2376d70b4b494d5077d195
-
SHA256
d343b96c042127d09e8c352217518ac8cebe37a149d7dcc2f357bc42f745b1bd
-
SHA512
dc38dad9706da23faabdad35cd1b460341aaa3cc35fa2c2106c63fe89981ac4b00a485548b1c2e9ef3b391d00ea165d26abfe1c45fc952b3c6d3da080da33c53
-
SSDEEP
384:1XA3ZfKPgE9o3t+ivPMPlKd1LtctCrgFdJWj7Ia3XmNHg:OfKBhKd1aCrgfJO132NA
Static task
static1
Behavioral task
behavioral1
Sample
PasteHook.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7176059714:AAHLQAohqhJW7FGmgGL4d1LQXdAckM2UGto/sendMessage?chat_id=1498157292
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
PasteHook.exe
-
Size
19KB
-
MD5
2d6eec7c4e6fa137078f28fb192c4578
-
SHA1
7fc20709c0b346263b2376d70b4b494d5077d195
-
SHA256
d343b96c042127d09e8c352217518ac8cebe37a149d7dcc2f357bc42f745b1bd
-
SHA512
dc38dad9706da23faabdad35cd1b460341aaa3cc35fa2c2106c63fe89981ac4b00a485548b1c2e9ef3b391d00ea165d26abfe1c45fc952b3c6d3da080da33c53
-
SSDEEP
384:1XA3ZfKPgE9o3t+ivPMPlKd1LtctCrgFdJWj7Ia3XmNHg:OfKBhKd1aCrgfJO132NA
-
StormKitty payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1