General
-
Target
CrashSmash.exe
-
Size
264KB
-
Sample
241001-ssk4lsweqm
-
MD5
7c64ffb6d4b7fed10d9bc6c136ddcec4
-
SHA1
47b489693fe17be57f35abf272497f0d6abc1ca2
-
SHA256
6da2792e0500e75c0ce3b07c8cbfbc77d6b9e07260e5d28ca1a48d61df14c380
-
SHA512
5f48d0b4375e583582196b09cd8cb6c600b35e1df1607a4757aa91656312400dbe6a6fa1a71e4a525ae6830271c949746d27b6465bb9cb8ae8aaf8698d1ea261
-
SSDEEP
6144:qXtb5KcXr7XmfgqtjhAxZ0b2lDG/PHhiZC:EKcXrCf/QlZ
Behavioral task
behavioral1
Sample
CrashSmash.exe
Resource
win7-20240903-de
Behavioral task
behavioral2
Sample
CrashSmash.exe
Resource
win10v2004-20240802-de
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6986026812:AAGMUhHJ6YNAvj-9EfaA1qFoj4rdW5DHGwo/sendMessage?chat_id=5912565656
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
CrashSmash.exe
-
Size
264KB
-
MD5
7c64ffb6d4b7fed10d9bc6c136ddcec4
-
SHA1
47b489693fe17be57f35abf272497f0d6abc1ca2
-
SHA256
6da2792e0500e75c0ce3b07c8cbfbc77d6b9e07260e5d28ca1a48d61df14c380
-
SHA512
5f48d0b4375e583582196b09cd8cb6c600b35e1df1607a4757aa91656312400dbe6a6fa1a71e4a525ae6830271c949746d27b6465bb9cb8ae8aaf8698d1ea261
-
SSDEEP
6144:qXtb5KcXr7XmfgqtjhAxZ0b2lDG/PHhiZC:EKcXrCf/QlZ
-
StormKitty payload
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1