General

  • Target

    7623799dc5b101e55edb08459ff09232d41579776b1110ae119c52580ed09c41N.exe

  • Size

    3.2MB

  • Sample

    241222-g6t3wsxldz

  • MD5

    2fcda8a0696d0cb8735e8243524ab110

  • SHA1

    4c1ef9e0ab4bc7fd4fb673b6af627830b0a8f9c4

  • SHA256

    7623799dc5b101e55edb08459ff09232d41579776b1110ae119c52580ed09c41

  • SHA512

    a76c2bb7e1831f0e29fca56f979f786437021f64d874c9d9294be9e87860c9edaf4cd59e47130411783ea364c5c7fa5655266dc11f5e13a5d23d245d7b5525cd

  • SSDEEP

    98304:kKaLGKadqrcJJbruZjqdJ9SSFXO0UDae0AXkv5Iw5dI:ELK+ROqSFe0fAXE5Iw5i

Malware Config

Targets

    • Target

      7623799dc5b101e55edb08459ff09232d41579776b1110ae119c52580ed09c41N.exe

    • Size

      3.2MB

    • MD5

      2fcda8a0696d0cb8735e8243524ab110

    • SHA1

      4c1ef9e0ab4bc7fd4fb673b6af627830b0a8f9c4

    • SHA256

      7623799dc5b101e55edb08459ff09232d41579776b1110ae119c52580ed09c41

    • SHA512

      a76c2bb7e1831f0e29fca56f979f786437021f64d874c9d9294be9e87860c9edaf4cd59e47130411783ea364c5c7fa5655266dc11f5e13a5d23d245d7b5525cd

    • SSDEEP

      98304:kKaLGKadqrcJJbruZjqdJ9SSFXO0UDae0AXkv5Iw5dI:ELK+ROqSFe0fAXE5Iw5i

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks