General

  • Target

    PryntVirus.exe

  • Size

    232KB

  • Sample

    241215-scksxazkcj

  • MD5

    ea10b6fdbb466c9e2bc1602efa14e4be

  • SHA1

    f9144cda448d4cf8ff47ac9cdb56ed262c5f9de3

  • SHA256

    e574a3494f4b760d028ccb7c8c73d6997aa7fd422104fa9b56c9ab3ddb695b2b

  • SHA512

    81e076141d108f914008b29e2f7b350e832c1e1edb44d778a8150b8011c78452d29c1c563faf3da201cc8a91e61ac2b5bad7298be3ba36659a24298df4149fe9

  • SSDEEP

    6144:jDubaBBOBIIj6HLLYLCYJqvc1DfNu4i8wb/SHbt5BasO5oUpNKEzoh:mbaYgh8wb6DY7XpQ

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot8038687818:AAF7yfWLNIj0GslX51tOIFXZ_75cuFnZ9oc/sendMessage?chat_id=6378570062

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      PryntVirus.exe

    • Size

      232KB

    • MD5

      ea10b6fdbb466c9e2bc1602efa14e4be

    • SHA1

      f9144cda448d4cf8ff47ac9cdb56ed262c5f9de3

    • SHA256

      e574a3494f4b760d028ccb7c8c73d6997aa7fd422104fa9b56c9ab3ddb695b2b

    • SHA512

      81e076141d108f914008b29e2f7b350e832c1e1edb44d778a8150b8011c78452d29c1c563faf3da201cc8a91e61ac2b5bad7298be3ba36659a24298df4149fe9

    • SSDEEP

      6144:jDubaBBOBIIj6HLLYLCYJqvc1DfNu4i8wb/SHbt5BasO5oUpNKEzoh:mbaYgh8wb6DY7XpQ

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks