General
-
Target
Client.exe
-
Size
175KB
-
Sample
240916-vhe6qayhkl
-
MD5
50f1d8f3ae2ba26baba9110bb7012874
-
SHA1
d73580a504cb9764a1420f3d27de2eff4a415938
-
SHA256
324a9a6ac7182049c0c2778c28aacb856a16bd7d41c7142449550d03946bb52c
-
SHA512
6e6beab861316e36a35d9b755b6fa63db8dc61c63eecf6cb27f008e1d2953c4ebcc1d7e6ed56241ff62ca5a4fa51a27ef40e692a5a51a4909b96f42e9112c254
-
SSDEEP
3072:le8p6ewdOIwQx76vK/bvTv0cU+lL/dMlZZUZ0b2gTlwARE+WpCc:p6ewwIwQJ6vKX0c5MlYZ0b2G
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6799458854:AAHitH2Kpnt-1DMoGhbvJ704MzG8-QToRls/sendMessage?chat_id=7483355978
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Client.exe
-
Size
175KB
-
MD5
50f1d8f3ae2ba26baba9110bb7012874
-
SHA1
d73580a504cb9764a1420f3d27de2eff4a415938
-
SHA256
324a9a6ac7182049c0c2778c28aacb856a16bd7d41c7142449550d03946bb52c
-
SHA512
6e6beab861316e36a35d9b755b6fa63db8dc61c63eecf6cb27f008e1d2953c4ebcc1d7e6ed56241ff62ca5a4fa51a27ef40e692a5a51a4909b96f42e9112c254
-
SSDEEP
3072:le8p6ewdOIwQx76vK/bvTv0cU+lL/dMlZZUZ0b2gTlwARE+WpCc:p6ewwIwQJ6vKX0c5MlYZ0b2G
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1