General
-
Target
3f783321d0495f069d5fdba74d22a401647e39406b99b5b8c8017b388615ef6bN.exe
-
Size
170KB
-
Sample
241218-gqjbfsxmgn
-
MD5
728337a3b6c7936ad9e27fd76e8b17d0
-
SHA1
2dd4dd32c2559fd74c1f1851edd9af831eb9bb7d
-
SHA256
3f783321d0495f069d5fdba74d22a401647e39406b99b5b8c8017b388615ef6b
-
SHA512
0df95383c01570ee172d3fa2e3e6b78d50a4b47338f76fbdd8bb1acfa5b6166306e7ce30f3623a4a2a290eb3eb715584619e06453d1e2879f67d44711396e9fa
-
SSDEEP
3072:O+STW8djpN6izj8mZw1vFcnxOlzqIPu/i9bHs2ch28kNko6+WpL:z8XN6W8mm71zXPSi9bMC8N
Behavioral task
behavioral1
Sample
3f783321d0495f069d5fdba74d22a401647e39406b99b5b8c8017b388615ef6bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f783321d0495f069d5fdba74d22a401647e39406b99b5b8c8017b388615ef6bN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7932706573:AAGbXOWsS-B1fEkJ_fBIU-9w70g3AUcYNr0/sendMessage?chat_id=1562128485
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
3f783321d0495f069d5fdba74d22a401647e39406b99b5b8c8017b388615ef6bN.exe
-
Size
170KB
-
MD5
728337a3b6c7936ad9e27fd76e8b17d0
-
SHA1
2dd4dd32c2559fd74c1f1851edd9af831eb9bb7d
-
SHA256
3f783321d0495f069d5fdba74d22a401647e39406b99b5b8c8017b388615ef6b
-
SHA512
0df95383c01570ee172d3fa2e3e6b78d50a4b47338f76fbdd8bb1acfa5b6166306e7ce30f3623a4a2a290eb3eb715584619e06453d1e2879f67d44711396e9fa
-
SSDEEP
3072:O+STW8djpN6izj8mZw1vFcnxOlzqIPu/i9bHs2ch28kNko6+WpL:z8XN6W8mm71zXPSi9bMC8N
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1