General
-
Target
Meta.v3.0.cracked.rar
-
Size
6.1MB
-
Sample
241212-ah3lssxrak
-
MD5
80f0209c71e159a12b284e9070782736
-
SHA1
6ebcec184f833642c8be195f0299e3c36d8ddbd2
-
SHA256
661958d0aa5bf8ac6fbc5c6bae19df1047041fa64819d523b4d10e6c922e26cf
-
SHA512
fed7a1b5f686b4ffa2a8ae191a8c21e345033a7773fad2b2b1cf35887659e4b7797a73e27790023fe59a32a587f66ed2e338f9d168450e7cb0a36bfb2a0c954f
-
SSDEEP
98304:sLr46ag4zz8RUciao7lMPVpIUoOdHZAqSRGMIqMOUwHcJ0DfkzKWLKXKgL/b:Qjag4zoigpIUBHoRUOUwE9GXagv
Static task
static1
Behavioral task
behavioral1
Sample
Meta.v3.0.cracked.rar
Resource
win11-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6097463381:AAFE6EI5D2TfE07x6OlKgJrWRj4KUyXcsn0/sendMessage?chat_id=5761333594
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Meta.v3.0.cracked.rar
-
Size
6.1MB
-
MD5
80f0209c71e159a12b284e9070782736
-
SHA1
6ebcec184f833642c8be195f0299e3c36d8ddbd2
-
SHA256
661958d0aa5bf8ac6fbc5c6bae19df1047041fa64819d523b4d10e6c922e26cf
-
SHA512
fed7a1b5f686b4ffa2a8ae191a8c21e345033a7773fad2b2b1cf35887659e4b7797a73e27790023fe59a32a587f66ed2e338f9d168450e7cb0a36bfb2a0c954f
-
SSDEEP
98304:sLr46ag4zz8RUciao7lMPVpIUoOdHZAqSRGMIqMOUwHcJ0DfkzKWLKXKgL/b:Qjag4zoigpIUBHoRUOUwE9GXagv
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1