General

  • Target

    a43d0af6d5d0ec78f6f9be2f5ee6acc80d3b3244a85c2a15ead0ca32f7e9fe43

  • Size

    232KB

  • Sample

    250104-xsgteasnfx

  • MD5

    dc72ad72d4a83486477121eb6679ce77

  • SHA1

    155d45d74ad3c17fc8186584c1d20fa0f8ef80e6

  • SHA256

    a43d0af6d5d0ec78f6f9be2f5ee6acc80d3b3244a85c2a15ead0ca32f7e9fe43

  • SHA512

    a77e0f65fdc93b07119e34265391886e095108349bdbab0440feb2ed49b3aef504337a9aab525b2265da488b3bbc5e46772c8a3da69547487b2da9000231b4ca

  • SSDEEP

    6144:rDubaBBOBIIj6HLLYLCYJqvc1DiFGPNv67EA7bYiiRGbNGfA:ebaMUbHiRcNq

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7549728726:AAHzXc-gyGOx-FQMI8AFOLjShmKqbPw-tWU/sendMessage?chat_id=6759888267

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      a43d0af6d5d0ec78f6f9be2f5ee6acc80d3b3244a85c2a15ead0ca32f7e9fe43

    • Size

      232KB

    • MD5

      dc72ad72d4a83486477121eb6679ce77

    • SHA1

      155d45d74ad3c17fc8186584c1d20fa0f8ef80e6

    • SHA256

      a43d0af6d5d0ec78f6f9be2f5ee6acc80d3b3244a85c2a15ead0ca32f7e9fe43

    • SHA512

      a77e0f65fdc93b07119e34265391886e095108349bdbab0440feb2ed49b3aef504337a9aab525b2265da488b3bbc5e46772c8a3da69547487b2da9000231b4ca

    • SSDEEP

      6144:rDubaBBOBIIj6HLLYLCYJqvc1DiFGPNv67EA7bYiiRGbNGfA:ebaMUbHiRcNq

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks