General
-
Target
27d4fe53b38807a49886f761932f495bb5998c5d2236f6858d693c35dd032fad
-
Size
170KB
-
Sample
241026-nqr2xstepf
-
MD5
a50a84ae0cbdfadf20fabbb3b3852e3d
-
SHA1
0002bde2e29c5deb54b7071d7c84206232ef306e
-
SHA256
27d4fe53b38807a49886f761932f495bb5998c5d2236f6858d693c35dd032fad
-
SHA512
27345bd277812cff1eb46e4aeae42153bef6ba9124671d3585b5ca93b14f1f8ef2a7eb7c25499a02c6900e3d0c1e13028f6c32a867098755e4f4121f13654f20
-
SSDEEP
3072:++STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cHTzOD6+Wp7:j8XN6W8mmHPtppXPSi9b4BO
Behavioral task
behavioral1
Sample
27d4fe53b38807a49886f761932f495bb5998c5d2236f6858d693c35dd032fad.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27d4fe53b38807a49886f761932f495bb5998c5d2236f6858d693c35dd032fad.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7074211690:AAFHdtGIEk1j3FpHjh6_p8Xjh9rfZDo4uSc/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
27d4fe53b38807a49886f761932f495bb5998c5d2236f6858d693c35dd032fad
-
Size
170KB
-
MD5
a50a84ae0cbdfadf20fabbb3b3852e3d
-
SHA1
0002bde2e29c5deb54b7071d7c84206232ef306e
-
SHA256
27d4fe53b38807a49886f761932f495bb5998c5d2236f6858d693c35dd032fad
-
SHA512
27345bd277812cff1eb46e4aeae42153bef6ba9124671d3585b5ca93b14f1f8ef2a7eb7c25499a02c6900e3d0c1e13028f6c32a867098755e4f4121f13654f20
-
SSDEEP
3072:++STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cHTzOD6+Wp7:j8XN6W8mmHPtppXPSi9b4BO
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1