General
-
Target
Payment Confirmation.scr
-
Size
796KB
-
Sample
241218-kncmnstjdl
-
MD5
9faf1f32261228f8585abed6f20937fa
-
SHA1
77aed48c44f7ab0bebd9594dbf181c5ab37cfdbc
-
SHA256
ba9c66678d7a68160c563dbd9cfe0a1255a05191a9537fea44c4a264c4abebd4
-
SHA512
2746e15661edc7e865b9e59a40bf537142aa5bf261f32ce47eac8a7c344497360ef270a63f0bc114fe69496fceb4227702110f5a990bebd5efcee64e8c99e513
-
SSDEEP
12288:nb8f2uE1zDo5MXuvMhHshfzujSmDFkrpQA5Ay9KSZT1ywFL8Cnj8f2:nbu2uOQ5MeUhezuSt8yrywCCnju2
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment Confirmation.scr
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7706441145:AAGi9KVU48kkRRQ9YRTCxkt9Lt_xWJ_wQ8w/sendMessage?chat_id=7557285388
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Payment Confirmation.scr
-
Size
796KB
-
MD5
9faf1f32261228f8585abed6f20937fa
-
SHA1
77aed48c44f7ab0bebd9594dbf181c5ab37cfdbc
-
SHA256
ba9c66678d7a68160c563dbd9cfe0a1255a05191a9537fea44c4a264c4abebd4
-
SHA512
2746e15661edc7e865b9e59a40bf537142aa5bf261f32ce47eac8a7c344497360ef270a63f0bc114fe69496fceb4227702110f5a990bebd5efcee64e8c99e513
-
SSDEEP
12288:nb8f2uE1zDo5MXuvMhHshfzujSmDFkrpQA5Ay9KSZT1ywFL8Cnj8f2:nbu2uOQ5MeUhezuSt8yrywCCnju2
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1