General

  • Target

    cheat-Client-18.4.rar

  • Size

    66.7MB

  • Sample

    241001-ykc1xsxeqp

  • MD5

    40d4e528eccf83ef8eb697727ac432cd

  • SHA1

    d570c974866deeb04dd1d2bf5019a3e8af22db0a

  • SHA256

    068e727f7a752a65815025756376baa1ae5622a6518cf8056764cfffa7d0b815

  • SHA512

    97151ce34130c18f7b5c913ffd78c673e5fdba95f290fcee53d332ab2d3525acc5e66c6dc540806bff14af59039782c35d4a5276ae4991e5a7216609a27da7cc

  • SSDEEP

    1572864:zbNK/t3LWPR9o1PmlKKeL7jp3k7cOObE4G4vpP3mHDYsm:tK/ZL2fHKKoTG4v13Mjm

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7559842378:AAEO5G-UvKkJGXAkNr6mdPi4Yrgvo7GFhDE/sendMessage?chat_id=1426495159

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      cheat-Client-18.4/cheat ddnet.exe

    • Size

      13.8MB

    • MD5

      c243a4b95f7bd67a1787ca5637506d28

    • SHA1

      c9d77c9c982d3b74057ddf39bc394c1089ebe762

    • SHA256

      10e075782de89b66ee1780aa15ee50b3f1aa7caaeffa86d3855a27c19f1fed5f

    • SHA512

      400b1906a3a1b5bb00109d2e067c7e0a86589275f0c1106942e4a056019a5f0b00dbeec233a3eb92d33cbd9783cd030453bd0623e6b3dc3863de6e31e6dfd9a7

    • SSDEEP

      393216:UZogBso8b4gFr5jSpEVCZPQmlgoWNuQ4Le:UZoK8b/im0ZYmlgAQ4Le

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks