General
-
Target
a43d0af6d5d0ec78f6f9be2f5ee6acc80d3b3244a85c2a15ead0ca32f7e9fe43
-
Size
232KB
-
Sample
250104-xsgteasnfx
-
MD5
dc72ad72d4a83486477121eb6679ce77
-
SHA1
155d45d74ad3c17fc8186584c1d20fa0f8ef80e6
-
SHA256
a43d0af6d5d0ec78f6f9be2f5ee6acc80d3b3244a85c2a15ead0ca32f7e9fe43
-
SHA512
a77e0f65fdc93b07119e34265391886e095108349bdbab0440feb2ed49b3aef504337a9aab525b2265da488b3bbc5e46772c8a3da69547487b2da9000231b4ca
-
SSDEEP
6144:rDubaBBOBIIj6HLLYLCYJqvc1DiFGPNv67EA7bYiiRGbNGfA:ebaMUbHiRcNq
Behavioral task
behavioral1
Sample
a43d0af6d5d0ec78f6f9be2f5ee6acc80d3b3244a85c2a15ead0ca32f7e9fe43.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a43d0af6d5d0ec78f6f9be2f5ee6acc80d3b3244a85c2a15ead0ca32f7e9fe43.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7549728726:AAHzXc-gyGOx-FQMI8AFOLjShmKqbPw-tWU/sendMessage?chat_id=6759888267
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
a43d0af6d5d0ec78f6f9be2f5ee6acc80d3b3244a85c2a15ead0ca32f7e9fe43
-
Size
232KB
-
MD5
dc72ad72d4a83486477121eb6679ce77
-
SHA1
155d45d74ad3c17fc8186584c1d20fa0f8ef80e6
-
SHA256
a43d0af6d5d0ec78f6f9be2f5ee6acc80d3b3244a85c2a15ead0ca32f7e9fe43
-
SHA512
a77e0f65fdc93b07119e34265391886e095108349bdbab0440feb2ed49b3aef504337a9aab525b2265da488b3bbc5e46772c8a3da69547487b2da9000231b4ca
-
SSDEEP
6144:rDubaBBOBIIj6HLLYLCYJqvc1DiFGPNv67EA7bYiiRGbNGfA:ebaMUbHiRcNq
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1