General
-
Target
Test.exe
-
Size
4.0MB
-
Sample
241119-hvkwhswqer
-
MD5
55603e2a16f0a6d517d63ec1552e45ed
-
SHA1
2ebc5c1cbff5675f2c13f06e45e5039940107077
-
SHA256
bbd2b2f19bef121ba2bff9bc1a40227e8114494b55165f3cbd8e53e59fc9daec
-
SHA512
13475013baee647999c12ef8648492b7a841ed549582782ea45dccb0a5c4a05bcf3374374f1c72c5de8376741eb2ca5215f6d87a2802a4af49b56fd4cc2b7666
-
SSDEEP
768:WtoQVuOPx178nkC8A+XICpeyr61urX1+T4uoSBGHmDbDzph0oX3ZErGSucdpqKYC:WVxXPn0tYUbph93ZEFucdpqKmY7
Behavioral task
behavioral1
Sample
Test.exe
Resource
win11-20241007-en
Malware Config
Extracted
asyncrat
Victim
193.161.193.99:36700
-
delay
1
-
install
true
-
install_file
sysvlrhp.exe
-
install_folder
%AppData%
Targets
-
-
Target
Test.exe
-
Size
4.0MB
-
MD5
55603e2a16f0a6d517d63ec1552e45ed
-
SHA1
2ebc5c1cbff5675f2c13f06e45e5039940107077
-
SHA256
bbd2b2f19bef121ba2bff9bc1a40227e8114494b55165f3cbd8e53e59fc9daec
-
SHA512
13475013baee647999c12ef8648492b7a841ed549582782ea45dccb0a5c4a05bcf3374374f1c72c5de8376741eb2ca5215f6d87a2802a4af49b56fd4cc2b7666
-
SSDEEP
768:WtoQVuOPx178nkC8A+XICpeyr61urX1+T4uoSBGHmDbDzph0oX3ZErGSucdpqKYC:WVxXPn0tYUbph93ZEFucdpqKmY7
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Renames multiple (3116) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1