General
-
Target
ElitecutSetup.exe
-
Size
7.2MB
-
Sample
241121-3rdm9azmgz
-
MD5
9b7d706bac6f21d08f43b62f993933a5
-
SHA1
b6794baa320f187d239d40e949f5aaf8aeff6c62
-
SHA256
38ed1513b169db909595c0f37d660ebbeeb87946ad9ada15d1ebb45f7ed4ee06
-
SHA512
f61ce99033e2e5af55d1aa425fcf69a4a4009220411d2320733430b717d2a60fd59f4df1205d4ff0b15e3f65302835a592559789bcdbbb6aaf933f28f8920bf8
-
SSDEEP
196608:XT9a8z0a7oXwmIaKF39LQzl99MatTxRStt5dr/:J1zHvaKFNL2l9WaInr/
Static task
static1
Behavioral task
behavioral1
Sample
ElitecutSetup.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
asyncrat
Furry
193.161.193.99:36700
-
delay
1
-
install
true
-
install_file
syskprvalor.exe
-
install_folder
%AppData%
Targets
-
-
Target
ElitecutSetup.exe
-
Size
7.2MB
-
MD5
9b7d706bac6f21d08f43b62f993933a5
-
SHA1
b6794baa320f187d239d40e949f5aaf8aeff6c62
-
SHA256
38ed1513b169db909595c0f37d660ebbeeb87946ad9ada15d1ebb45f7ed4ee06
-
SHA512
f61ce99033e2e5af55d1aa425fcf69a4a4009220411d2320733430b717d2a60fd59f4df1205d4ff0b15e3f65302835a592559789bcdbbb6aaf933f28f8920bf8
-
SSDEEP
196608:XT9a8z0a7oXwmIaKF39LQzl99MatTxRStt5dr/:J1zHvaKFNL2l9WaInr/
-
Asyncrat family
-
Stealerium family
-
StormKitty payload
-
Stormkitty family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1