General
-
Target
b3e3a88f9cb278546154087f76d8a2d55750592733b3e4d01c757f75972fa83c
-
Size
170KB
-
Sample
241128-c43vss1qbz
-
MD5
75d9913194a42bcaf3c1d33167ab584f
-
SHA1
6c77a871e5c67f265ed5c7c0df7ebb63ba0d7da8
-
SHA256
b3e3a88f9cb278546154087f76d8a2d55750592733b3e4d01c757f75972fa83c
-
SHA512
aace4ee38e7343515937c1586e5b41b299e2299b402e5f41bdca544a6afdbb54bd539a3f4472969163e138d6df5f63c67fe955b2c9c271545b3f19c92cdba383
-
SSDEEP
3072:2+STW8djpN6izj8mZwNVOHq0HyKqIPu/C9bcJ2cKPfV76+WpT:L8XN6W8mm/eHXPSC9b4MV
Behavioral task
behavioral1
Sample
b3e3a88f9cb278546154087f76d8a2d55750592733b3e4d01c757f75972fa83c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b3e3a88f9cb278546154087f76d8a2d55750592733b3e4d01c757f75972fa83c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7734385742:AAHKSj_7Tq8Z69W2PH2MrHKyblq4d4tM3vE/sendMessage?chat_id=7571391032
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
b3e3a88f9cb278546154087f76d8a2d55750592733b3e4d01c757f75972fa83c
-
Size
170KB
-
MD5
75d9913194a42bcaf3c1d33167ab584f
-
SHA1
6c77a871e5c67f265ed5c7c0df7ebb63ba0d7da8
-
SHA256
b3e3a88f9cb278546154087f76d8a2d55750592733b3e4d01c757f75972fa83c
-
SHA512
aace4ee38e7343515937c1586e5b41b299e2299b402e5f41bdca544a6afdbb54bd539a3f4472969163e138d6df5f63c67fe955b2c9c271545b3f19c92cdba383
-
SSDEEP
3072:2+STW8djpN6izj8mZwNVOHq0HyKqIPu/C9bcJ2cKPfV76+WpT:L8XN6W8mm/eHXPSC9b4MV
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1