General
-
Target
Hackus.exe
-
Size
3.0MB
-
Sample
250104-p8t5nszphs
-
MD5
9c663208365a83ec2b477cccb6467b48
-
SHA1
e7b1ade7745edb3728819e91e63cbc8150bef850
-
SHA256
28d86a07879646a56eb6540184ba97968909b23bcfd85e902ae868521c311e81
-
SHA512
a61c99646df0b701d1674534e7258e4714f7930f6220f93bdb15ea0c8351b8ea288c033cf388932d18986a0a5005c694933a94abb4f591b76a90867600302379
-
SSDEEP
24576:Fl66l+Tg33ypYcJ52Ymx35h0s5zQ+6fe05bdgBJrGrdqDwEHK2oJ8BoZecPKeNlb:FLlP3G5KT6W0/KJQdqsF5JcJ+l2VbbU
Behavioral task
behavioral1
Sample
Hackus.exe
Resource
win7-20241023-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7044437613:AAEXeS1SKGTrEjQ8F-7vSegWo8OLABeJY5k/sendMessage?chat_id=6052812018
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Hackus.exe
-
Size
3.0MB
-
MD5
9c663208365a83ec2b477cccb6467b48
-
SHA1
e7b1ade7745edb3728819e91e63cbc8150bef850
-
SHA256
28d86a07879646a56eb6540184ba97968909b23bcfd85e902ae868521c311e81
-
SHA512
a61c99646df0b701d1674534e7258e4714f7930f6220f93bdb15ea0c8351b8ea288c033cf388932d18986a0a5005c694933a94abb4f591b76a90867600302379
-
SSDEEP
24576:Fl66l+Tg33ypYcJ52Ymx35h0s5zQ+6fe05bdgBJrGrdqDwEHK2oJ8BoZecPKeNlb:FLlP3G5KT6W0/KJQdqsF5JcJ+l2VbbU
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1