General

  • Target

    462a775459ff47f35c88bd5c5110892a_JaffaCakes118

  • Size

    232KB

  • Sample

    241015-gnm7masekm

  • MD5

    462a775459ff47f35c88bd5c5110892a

  • SHA1

    8eb86236c22bf72c3b709d16cb0183e78943482a

  • SHA256

    bc3871afaa330c149bd07ec98db6a83667075f09f157019fb512576bd571b375

  • SHA512

    def36d4ee43a4e99203d862a2fe8e31670886bbf9fdf9a0381c2244829ad948b2aca5aba29f9586f5f8c80005e7bffc0ad8878894311cf7c2ca70d5b1ce86a57

  • SSDEEP

    6144:rDdL/VwbEIIj65LLYLCYJqvc1DnGtLCb/9Hb2ZtFoChrr+1Bc:tL/XGwb1CqClr+1B

Malware Config

Extracted

Family

asyncrat

Version

BADCORP TEAM

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot1978699639:AAE93qvxqBXcbblawlvC1IsFRg0XmDZ2MR8/sendMessage?chat_id=1899206229

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      462a775459ff47f35c88bd5c5110892a_JaffaCakes118

    • Size

      232KB

    • MD5

      462a775459ff47f35c88bd5c5110892a

    • SHA1

      8eb86236c22bf72c3b709d16cb0183e78943482a

    • SHA256

      bc3871afaa330c149bd07ec98db6a83667075f09f157019fb512576bd571b375

    • SHA512

      def36d4ee43a4e99203d862a2fe8e31670886bbf9fdf9a0381c2244829ad948b2aca5aba29f9586f5f8c80005e7bffc0ad8878894311cf7c2ca70d5b1ce86a57

    • SSDEEP

      6144:rDdL/VwbEIIj65LLYLCYJqvc1DnGtLCb/9Hb2ZtFoChrr+1Bc:tL/XGwb1CqClr+1B

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks