General
-
Target
187ae0cb45f21b2fee6eacaf297bd965acdcd3822b3d0cd09602add1cf03cb40
-
Size
518KB
-
Sample
250104-xrb7jasnbw
-
MD5
f249f6f4f9d8c37b6eaa483e188b844e
-
SHA1
fb2bc26dafdf08f306307c201575a2babf3046e7
-
SHA256
187ae0cb45f21b2fee6eacaf297bd965acdcd3822b3d0cd09602add1cf03cb40
-
SHA512
1e2ba01ad35fb34d4ff3af4acbe4f62c543a27db8e189eec91fcced1128f28999391efffbfcc2af55bbef6eb37004b1198f852b03605ce3eb29e0cb11fc052ec
-
SSDEEP
6144:fSncRljDubaBBOBIIj6HLLYLCYJqvc1DiFGPNv67EA7bYiiRGbNGfAJDubaBBOBY:a4IbaMUbHiRcNqnbaExhNbxykvgItw
Behavioral task
behavioral1
Sample
187ae0cb45f21b2fee6eacaf297bd965acdcd3822b3d0cd09602add1cf03cb40.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
187ae0cb45f21b2fee6eacaf297bd965acdcd3822b3d0cd09602add1cf03cb40.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7549728726:AAHzXc-gyGOx-FQMI8AFOLjShmKqbPw-tWU/sendMessage?chat_id=6759888267
https://api.telegram.org/bot7289188591:AAFXBqcWy9p_LgUKTwd-Pcl7lvzedUGWL1E/sendMessage?chat_id=8079461533
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
187ae0cb45f21b2fee6eacaf297bd965acdcd3822b3d0cd09602add1cf03cb40
-
Size
518KB
-
MD5
f249f6f4f9d8c37b6eaa483e188b844e
-
SHA1
fb2bc26dafdf08f306307c201575a2babf3046e7
-
SHA256
187ae0cb45f21b2fee6eacaf297bd965acdcd3822b3d0cd09602add1cf03cb40
-
SHA512
1e2ba01ad35fb34d4ff3af4acbe4f62c543a27db8e189eec91fcced1128f28999391efffbfcc2af55bbef6eb37004b1198f852b03605ce3eb29e0cb11fc052ec
-
SSDEEP
6144:fSncRljDubaBBOBIIj6HLLYLCYJqvc1DiFGPNv67EA7bYiiRGbNGfAJDubaBBOBY:a4IbaMUbHiRcNqnbaExhNbxykvgItw
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1