General

  • Target

    fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exe

  • Size

    95.5MB

  • Sample

    241114-njat3axqas

  • MD5

    ce6f5ba448e5b85d0410c70eb68b8b7b

  • SHA1

    d82919e11eeaa23997e5047d2041c5acb8c3bab5

  • SHA256

    fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c

  • SHA512

    1f9a82b77ae9e18d82b4c0751e114b27f1b009968644353ed2bfeb5315b8f8fcd4dee4c74b00d35bc1f76cd0bd0078014697797dfe4fd082dd54460aa7260dee

  • SSDEEP

    1536:srae78zjORCDGwfdCSog01313zAYs5gczGNuKTFP76k:0ahKyd2n31UR5MTFPJ

Malware Config

Targets

    • Target

      fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exe

    • Size

      95.5MB

    • MD5

      ce6f5ba448e5b85d0410c70eb68b8b7b

    • SHA1

      d82919e11eeaa23997e5047d2041c5acb8c3bab5

    • SHA256

      fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c

    • SHA512

      1f9a82b77ae9e18d82b4c0751e114b27f1b009968644353ed2bfeb5315b8f8fcd4dee4c74b00d35bc1f76cd0bd0078014697797dfe4fd082dd54460aa7260dee

    • SSDEEP

      1536:srae78zjORCDGwfdCSog01313zAYs5gczGNuKTFP76k:0ahKyd2n31UR5MTFPJ

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks