General

  • Target

    3f783321d0495f069d5fdba74d22a401647e39406b99b5b8c8017b388615ef6bN.exe

  • Size

    170KB

  • Sample

    241218-gqjbfsxmgn

  • MD5

    728337a3b6c7936ad9e27fd76e8b17d0

  • SHA1

    2dd4dd32c2559fd74c1f1851edd9af831eb9bb7d

  • SHA256

    3f783321d0495f069d5fdba74d22a401647e39406b99b5b8c8017b388615ef6b

  • SHA512

    0df95383c01570ee172d3fa2e3e6b78d50a4b47338f76fbdd8bb1acfa5b6166306e7ce30f3623a4a2a290eb3eb715584619e06453d1e2879f67d44711396e9fa

  • SSDEEP

    3072:O+STW8djpN6izj8mZw1vFcnxOlzqIPu/i9bHs2ch28kNko6+WpL:z8XN6W8mm71zXPSi9bMC8N

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7932706573:AAGbXOWsS-B1fEkJ_fBIU-9w70g3AUcYNr0/sendMessage?chat_id=1562128485

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      3f783321d0495f069d5fdba74d22a401647e39406b99b5b8c8017b388615ef6bN.exe

    • Size

      170KB

    • MD5

      728337a3b6c7936ad9e27fd76e8b17d0

    • SHA1

      2dd4dd32c2559fd74c1f1851edd9af831eb9bb7d

    • SHA256

      3f783321d0495f069d5fdba74d22a401647e39406b99b5b8c8017b388615ef6b

    • SHA512

      0df95383c01570ee172d3fa2e3e6b78d50a4b47338f76fbdd8bb1acfa5b6166306e7ce30f3623a4a2a290eb3eb715584619e06453d1e2879f67d44711396e9fa

    • SSDEEP

      3072:O+STW8djpN6izj8mZw1vFcnxOlzqIPu/i9bHs2ch28kNko6+WpL:z8XN6W8mm71zXPSi9bMC8N

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks