General
-
Target
99d2c277b2dd65cd1dd8c954501043a2ec5891d339b7b8ddfad373841d9a9733
-
Size
170KB
-
Sample
250109-ymle3s1ngr
-
MD5
efbe77e5aaf51ee1be7a02d2d55f6171
-
SHA1
5e88c3031a53715b82a66165d192551226c3de7f
-
SHA256
99d2c277b2dd65cd1dd8c954501043a2ec5891d339b7b8ddfad373841d9a9733
-
SHA512
8ba2f5c72e40249f73dc092054b118c9d3faf98978a5aac06662869ef4ed5f2b974759cf1bee2155d40e15bc647e2499c621a0915f6a79b07c640bff76e2d2db
-
SSDEEP
3072:O+STW8djpN6izj8mZwkYXvYUCEqIPu/i9bsJ2cjJI6+WpL:z8XN6W8mmBn5XPSi9boD
Behavioral task
behavioral1
Sample
99d2c277b2dd65cd1dd8c954501043a2ec5891d339b7b8ddfad373841d9a9733.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
99d2c277b2dd65cd1dd8c954501043a2ec5891d339b7b8ddfad373841d9a9733.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7948363538:AAGPxAvOVmzz8x-5s0mHYlUprnmFgCHGEyo/sendMessage?chat_id=2115574643
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
99d2c277b2dd65cd1dd8c954501043a2ec5891d339b7b8ddfad373841d9a9733
-
Size
170KB
-
MD5
efbe77e5aaf51ee1be7a02d2d55f6171
-
SHA1
5e88c3031a53715b82a66165d192551226c3de7f
-
SHA256
99d2c277b2dd65cd1dd8c954501043a2ec5891d339b7b8ddfad373841d9a9733
-
SHA512
8ba2f5c72e40249f73dc092054b118c9d3faf98978a5aac06662869ef4ed5f2b974759cf1bee2155d40e15bc647e2499c621a0915f6a79b07c640bff76e2d2db
-
SSDEEP
3072:O+STW8djpN6izj8mZwkYXvYUCEqIPu/i9bsJ2cjJI6+WpL:z8XN6W8mmBn5XPSi9boD
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1