General
-
Target
53965f472183c0e8ec94202b3ba0716faf8e095e073a688f3396c4b8dcca6f30
-
Size
785KB
-
Sample
241214-xr7nfasrcp
-
MD5
54dbe54846a05d5a1677a5ab2970bd6a
-
SHA1
4ea5792f72f540c58a54f5cfce9de19eb05ffaaa
-
SHA256
53965f472183c0e8ec94202b3ba0716faf8e095e073a688f3396c4b8dcca6f30
-
SHA512
f4778a6162b01bcfbb4d26b4686c9caea803b995b74d9f1c080eda0a431820827ddd9601265c23c1220de36faeb75c5e3b738b8adadf1ca76a5a350552b5bf4a
-
SSDEEP
12288:5NMKhM39TXsTAiYRH3wbrccYpea/jiAsRaT21tKkxRzb53/x6Io5kZaiB:HMaciYlwkp5/o0i1tVRp6IfB
Static task
static1
Behavioral task
behavioral1
Sample
53965f472183c0e8ec94202b3ba0716faf8e095e073a688f3396c4b8dcca6f30.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
53965f472183c0e8ec94202b3ba0716faf8e095e073a688f3396c4b8dcca6f30.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6331768257:AAE1Rrc3F4A-nTJkfXEukNBriTate8i72L8/sendMessage?chat_id=5287158069
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
53965f472183c0e8ec94202b3ba0716faf8e095e073a688f3396c4b8dcca6f30
-
Size
785KB
-
MD5
54dbe54846a05d5a1677a5ab2970bd6a
-
SHA1
4ea5792f72f540c58a54f5cfce9de19eb05ffaaa
-
SHA256
53965f472183c0e8ec94202b3ba0716faf8e095e073a688f3396c4b8dcca6f30
-
SHA512
f4778a6162b01bcfbb4d26b4686c9caea803b995b74d9f1c080eda0a431820827ddd9601265c23c1220de36faeb75c5e3b738b8adadf1ca76a5a350552b5bf4a
-
SSDEEP
12288:5NMKhM39TXsTAiYRH3wbrccYpea/jiAsRaT21tKkxRzb53/x6Io5kZaiB:HMaciYlwkp5/o0i1tVRp6IfB
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
A potential corporate email address has been identified in the URL: WorldWindProResultsDate2024121470654PMSystemWindows10Pro64BitUsernameAdminCompNameUTKBEBLOLanguageenUSAntivirusNotinstalledHardwareCPU12thGenIntelRCoreTMi512400GPUMicrosoftBasicDisplayAdapterRAM16154MBHWIDUnknownPowerNoSystemBattery1Screen1280x720NetworkGatewayIP10.127.0.1InternalIP10.127.1.108ExternalIP181.215.176.83BSSID96a825be0f94DomainsinfoBankLogsNodataCryptoLogsNodataFreakyLogsNodataLogsBookmarks5SoftwareDeviceWindowsproductkeyDesktopscreenshotFileGrabberDatabasefiles6TelegramChannel@XSplinter
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1