General

  • Target

    po.bat

  • Size

    345KB

  • Sample

    241231-tve6ta1lfq

  • MD5

    25be610e8e3814d3a218e6ab74513af2

  • SHA1

    e94d8a8adbf9b42ee206ae0cea46b2d24225e9fc

  • SHA256

    b1d4310181ae2f48593c1fe2c68f71e6dd39c5f64254fd21304debb944bd1b11

  • SHA512

    201988cc2a36782c841e258160df4ec8d6ecafb8534d2868edbfd827de10e671b38df849f7c97686201fe0d6fb69d147d42b642f4cb6224705eb2a586b2c0235

  • SSDEEP

    6144:GR5FF+fw1uneHT10sG94hEHdiYOGgmNUgd/RZkOXTGKiTGtiIljFiqzpQJK:05j1unET1zG4E9FgmNUgd/PkOXniTeQw

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7783849752:AAGmjKBCU097MimSymLmRKxeBKFEEvQt3kM/sendMessage?chat_id=6795436266

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      po.bat

    • Size

      345KB

    • MD5

      25be610e8e3814d3a218e6ab74513af2

    • SHA1

      e94d8a8adbf9b42ee206ae0cea46b2d24225e9fc

    • SHA256

      b1d4310181ae2f48593c1fe2c68f71e6dd39c5f64254fd21304debb944bd1b11

    • SHA512

      201988cc2a36782c841e258160df4ec8d6ecafb8534d2868edbfd827de10e671b38df849f7c97686201fe0d6fb69d147d42b642f4cb6224705eb2a586b2c0235

    • SSDEEP

      6144:GR5FF+fw1uneHT10sG94hEHdiYOGgmNUgd/RZkOXTGKiTGtiIljFiqzpQJK:05j1unET1zG4E9FgmNUgd/PkOXniTeQw

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Async RAT payload

    • Blocklisted process makes network request

    • A potential corporate email address has been identified in the URL: WorldWindProResultsDate2024123142242PMSystemWindows10Pro64BitUsernameAdminCompNameHGNBWBGWLanguageenUSAntivirusNotinstalledHardwareCPU12thGenIntelRCoreTMi512400GPUMicrosoftBasicDisplayAdapterRAM16154MBHWIDUnknownPowerNoSystemBattery1Screen1280x720NetworkGatewayIP10.127.0.1InternalIP10.127.1.46ExternalIP181.215.176.83BSSID0a07a41c5f8cDomainsinfoBankLogsNodataCryptoLogsNodataFreakyLogsNodataLogsBookmarks5SoftwareDeviceWindowsproductkeyDesktopscreenshotFileGrabberDatabasefiles6TelegramChannel@XSplinter

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks