General
-
Target
0x0008000000017488-19.dat
-
Size
170KB
-
Sample
241102-sqaj4axhrj
-
MD5
96014694a042d8344b910bc47d79337b
-
SHA1
9d19ab2f110ae58f30965a5a3d608cbf51986edb
-
SHA256
4950eb74909bd6e739e38e57d8c6465c76ef108d65cac9f130d3f5c6d2fe943f
-
SHA512
fe308c42b3ad2c3d73a834399aa12ea23f336103389181dface80a81da8be1ffd9a950cac802dc8a806ad318eb90a6bb6021d1acd9206a07749f83f2bb6cd03d
-
SSDEEP
3072:T+STW8djpN6izj8mZwlZbX5gD5sLIPu/i9bTJ2cJ+rj6+Wpn:w8XN6W8mmzmDWMPSi9b1O
Behavioral task
behavioral1
Sample
0x0008000000017488-19.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
0x0008000000017488-19.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
0x0008000000017488-19.dat
-
Size
170KB
-
MD5
96014694a042d8344b910bc47d79337b
-
SHA1
9d19ab2f110ae58f30965a5a3d608cbf51986edb
-
SHA256
4950eb74909bd6e739e38e57d8c6465c76ef108d65cac9f130d3f5c6d2fe943f
-
SHA512
fe308c42b3ad2c3d73a834399aa12ea23f336103389181dface80a81da8be1ffd9a950cac802dc8a806ad318eb90a6bb6021d1acd9206a07749f83f2bb6cd03d
-
SSDEEP
3072:T+STW8djpN6izj8mZwlZbX5gD5sLIPu/i9bTJ2cJ+rj6+Wpn:w8XN6W8mmzmDWMPSi9b1O
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1