General
-
Target
RequstHunter.v1.exe
-
Size
273KB
-
Sample
241227-msjynavkbm
-
MD5
fc79bd5c3f70526b11f3fd1cb0db10cc
-
SHA1
a513aa52c892655d542884d97e02af80027ff243
-
SHA256
86e2aaf2ebbf947ac0e9cdf178cd27be6e84e8dfded476e4e6453b0c8f570290
-
SHA512
f262abe9d968a6b87f27dc92962477bd7801f929790aa254d082bd3a48c623ad7ca6edc598218df79ab56e482feb9c88b1f9ad792c214b9135580f36938e36f0
-
SSDEEP
6144:k9RBOBIIj6HLLYLCYJqvc1DOfRfGYb/FHbyeZP8vodSnbCWDuba9:afR+YbtdP8cuuba9
Behavioral task
behavioral1
Sample
RequstHunter.v1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7296708750:AAHaReWmJb8V8RSaBq85rGeMNuKmZ4t2rS0/sendMessage?chat_id=7389740990
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
RequstHunter.v1.exe
-
Size
273KB
-
MD5
fc79bd5c3f70526b11f3fd1cb0db10cc
-
SHA1
a513aa52c892655d542884d97e02af80027ff243
-
SHA256
86e2aaf2ebbf947ac0e9cdf178cd27be6e84e8dfded476e4e6453b0c8f570290
-
SHA512
f262abe9d968a6b87f27dc92962477bd7801f929790aa254d082bd3a48c623ad7ca6edc598218df79ab56e482feb9c88b1f9ad792c214b9135580f36938e36f0
-
SSDEEP
6144:k9RBOBIIj6HLLYLCYJqvc1DOfRfGYb/FHbyeZP8vodSnbCWDuba9:afR+YbtdP8cuuba9
-
Asyncrat family
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies system executable filetype association
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1