General

  • Target

    Meta.v3.0.cracked.rar

  • Size

    6.1MB

  • Sample

    241212-ah3lssxrak

  • MD5

    80f0209c71e159a12b284e9070782736

  • SHA1

    6ebcec184f833642c8be195f0299e3c36d8ddbd2

  • SHA256

    661958d0aa5bf8ac6fbc5c6bae19df1047041fa64819d523b4d10e6c922e26cf

  • SHA512

    fed7a1b5f686b4ffa2a8ae191a8c21e345033a7773fad2b2b1cf35887659e4b7797a73e27790023fe59a32a587f66ed2e338f9d168450e7cb0a36bfb2a0c954f

  • SSDEEP

    98304:sLr46ag4zz8RUciao7lMPVpIUoOdHZAqSRGMIqMOUwHcJ0DfkzKWLKXKgL/b:Qjag4zoigpIUBHoRUOUwE9GXagv

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6097463381:AAFE6EI5D2TfE07x6OlKgJrWRj4KUyXcsn0/sendMessage?chat_id=5761333594

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Meta.v3.0.cracked.rar

    • Size

      6.1MB

    • MD5

      80f0209c71e159a12b284e9070782736

    • SHA1

      6ebcec184f833642c8be195f0299e3c36d8ddbd2

    • SHA256

      661958d0aa5bf8ac6fbc5c6bae19df1047041fa64819d523b4d10e6c922e26cf

    • SHA512

      fed7a1b5f686b4ffa2a8ae191a8c21e345033a7773fad2b2b1cf35887659e4b7797a73e27790023fe59a32a587f66ed2e338f9d168450e7cb0a36bfb2a0c954f

    • SSDEEP

      98304:sLr46ag4zz8RUciao7lMPVpIUoOdHZAqSRGMIqMOUwHcJ0DfkzKWLKXKgL/b:Qjag4zoigpIUBHoRUOUwE9GXagv

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Async RAT payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks