General
-
Target
BotKiller.exe
-
Size
6KB
-
Sample
241126-299yqs1paj
-
MD5
10d199b2efdb69ed343f5cd4044b7def
-
SHA1
1f218983db04d9b7b31a67aeead5a94ca5d3dc80
-
SHA256
5fbd4e2c42e19e7ee561183ca6b2ded2f8049a890951704c799e8b4a016ab817
-
SHA512
682feb271c12a847b69f1ac92ad7d5cad18b145b64af83dbe7fd0f6282be8bf6091323ca16bc509f789a68e74e17eb1484fce907f9a0562237b40572e0e8852c
-
SSDEEP
96:1SJmM+BVOGjYKyhp+Aloz0yD/TB2uJW9wzNt:1smHOhpdXyLEuJIS
Static task
static1
Behavioral task
behavioral1
Sample
BotKiller.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
technical-southwest.gl.at.ply.gg:58694
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
BotKiller.exe
-
Size
6KB
-
MD5
10d199b2efdb69ed343f5cd4044b7def
-
SHA1
1f218983db04d9b7b31a67aeead5a94ca5d3dc80
-
SHA256
5fbd4e2c42e19e7ee561183ca6b2ded2f8049a890951704c799e8b4a016ab817
-
SHA512
682feb271c12a847b69f1ac92ad7d5cad18b145b64af83dbe7fd0f6282be8bf6091323ca16bc509f789a68e74e17eb1484fce907f9a0562237b40572e0e8852c
-
SSDEEP
96:1SJmM+BVOGjYKyhp+Aloz0yD/TB2uJW9wzNt:1smHOhpdXyLEuJIS
-
Asyncrat family
-
Stealerium family
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1