General
-
Target
6c0f0e572cc778c48fd9f7e933ff9074b77228073245504f55170fb7f89bec94
-
Size
233KB
-
Sample
250109-xqsg5azndp
-
MD5
3ae4d230b70fe627b578cec30d650733
-
SHA1
3ba4c86e93be24bb289d7936012547cc76e74b5d
-
SHA256
6c0f0e572cc778c48fd9f7e933ff9074b77228073245504f55170fb7f89bec94
-
SHA512
062adeba5c336d23799b4ff2a3cf99715dbc604a621047a99afb4e81b05f07bd96d0cd25690ba3ce9f69bd6310c8321f4e7b5fd1be4a6e77794c59d1c6352dc4
-
SSDEEP
6144:oDubaBBOBIIj6HLLYLCYJqvc1DQw3k+jjLb/8Hbxbs5VnzHI:Bbarw3kMb0lb4V
Behavioral task
behavioral1
Sample
6c0f0e572cc778c48fd9f7e933ff9074b77228073245504f55170fb7f89bec94.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6c0f0e572cc778c48fd9f7e933ff9074b77228073245504f55170fb7f89bec94.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7510964527:AAGdCh-pkbTYHGH3dVQA167HKQ6_6_J6-Bg/sendMessage?chat_id=7551483138
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
6c0f0e572cc778c48fd9f7e933ff9074b77228073245504f55170fb7f89bec94
-
Size
233KB
-
MD5
3ae4d230b70fe627b578cec30d650733
-
SHA1
3ba4c86e93be24bb289d7936012547cc76e74b5d
-
SHA256
6c0f0e572cc778c48fd9f7e933ff9074b77228073245504f55170fb7f89bec94
-
SHA512
062adeba5c336d23799b4ff2a3cf99715dbc604a621047a99afb4e81b05f07bd96d0cd25690ba3ce9f69bd6310c8321f4e7b5fd1be4a6e77794c59d1c6352dc4
-
SSDEEP
6144:oDubaBBOBIIj6HLLYLCYJqvc1DQw3k+jjLb/8Hbxbs5VnzHI:Bbarw3kMb0lb4V
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1