General
-
Target
d39083df8071d961f10ac9520645cad6b216d985b68e5ef71abc094dbff6cbb4N.exe
-
Size
185KB
-
Sample
250104-rtnqfstjhw
-
MD5
87af8e8d59047e5799c4922c2cad3220
-
SHA1
570f9e7af5ba8058a072ab6392449d1128933771
-
SHA256
d39083df8071d961f10ac9520645cad6b216d985b68e5ef71abc094dbff6cbb4
-
SHA512
3d21efb40d0133af0180fda23cacf8e7d4c13503bdff5d891a5c47026563e690a955caf2c80448bea6bb67bbecf7279fd85ab583385e65d8dcd1587d1f28f8a9
-
SSDEEP
3072:G+STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cKcs6+WpT:b8XN6W8mmHPtppXPSi9b43
Behavioral task
behavioral1
Sample
d39083df8071d961f10ac9520645cad6b216d985b68e5ef71abc094dbff6cbb4N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d39083df8071d961f10ac9520645cad6b216d985b68e5ef71abc094dbff6cbb4N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7939561809:AAHz2Vqx3T78_aqFxsPWL8XuAKKVQ7c2y3s/sendMessage?chat_id=7522999044
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
d39083df8071d961f10ac9520645cad6b216d985b68e5ef71abc094dbff6cbb4N.exe
-
Size
185KB
-
MD5
87af8e8d59047e5799c4922c2cad3220
-
SHA1
570f9e7af5ba8058a072ab6392449d1128933771
-
SHA256
d39083df8071d961f10ac9520645cad6b216d985b68e5ef71abc094dbff6cbb4
-
SHA512
3d21efb40d0133af0180fda23cacf8e7d4c13503bdff5d891a5c47026563e690a955caf2c80448bea6bb67bbecf7279fd85ab583385e65d8dcd1587d1f28f8a9
-
SSDEEP
3072:G+STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cKcs6+WpT:b8XN6W8mmHPtppXPSi9b43
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1