General
-
Target
IChanger.exe
-
Size
2.6MB
-
Sample
241021-yjpckavcpm
-
MD5
de70283085ca45f6b19bc3beb373e970
-
SHA1
30bcdfc110d03006ba0efd89def64628d2715ead
-
SHA256
e828e2b51c2c5412e66a660792ef393ce52c8e31d41d9c1adcac81367728fea6
-
SHA512
0e32b346714cf244e24ce0e6515e558c7a29157304e24f14d44ff3488486c19f9f0403fddb48dc6e95a3489eca503697d16c7e0e8e76d0e84264522af3e6d2c1
-
SSDEEP
49152:vG4DuZSgBVz68epmUAJWrrQiODZXHBdG:e7paboUS1dX3G
Static task
static1
Behavioral task
behavioral1
Sample
IChanger.exe
Resource
win11-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7510720859:AAHJ07lkxNWZwwJs6SC36WS0jVG9IR6m3pM/sendMessage?chat_id=6059920057
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
IChanger.exe
-
Size
2.6MB
-
MD5
de70283085ca45f6b19bc3beb373e970
-
SHA1
30bcdfc110d03006ba0efd89def64628d2715ead
-
SHA256
e828e2b51c2c5412e66a660792ef393ce52c8e31d41d9c1adcac81367728fea6
-
SHA512
0e32b346714cf244e24ce0e6515e558c7a29157304e24f14d44ff3488486c19f9f0403fddb48dc6e95a3489eca503697d16c7e0e8e76d0e84264522af3e6d2c1
-
SSDEEP
49152:vG4DuZSgBVz68epmUAJWrrQiODZXHBdG:e7paboUS1dX3G
-
StormKitty payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1