General
-
Target
153a321e178bc28e0f2c6432763bb44fc47b573596387ec241ca45d8775e12af.exe
-
Size
175KB
-
Sample
250110-rzbm3sxkfw
-
MD5
f69889d705f5d72d65661b48535ae1b3
-
SHA1
4c8f3cf14130e6519339a370bba4527ecb012cde
-
SHA256
153a321e178bc28e0f2c6432763bb44fc47b573596387ec241ca45d8775e12af
-
SHA512
a182272541b22dd58d44db506f0c3368fd0e54d0e616d48b6980563eb12d8d9a377bb0d0272c0c2576d36359f10367e27043d3c3106e5d985be0843112fedb3d
-
SSDEEP
3072:Ke8p6ewdOIwQx76vK/bvTv0cU+lL/dMlZZUZ0b2gT8wARE+WpCc:66ewwIwQJ6vKX0c5MlYZ0b2R
Behavioral task
behavioral1
Sample
153a321e178bc28e0f2c6432763bb44fc47b573596387ec241ca45d8775e12af.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
153a321e178bc28e0f2c6432763bb44fc47b573596387ec241ca45d8775e12af.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6331768257:AAE1Rrc3F4A-nTJkfXEukNBriTate8i72L8/sendMessage?chat_id=5287158069
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
153a321e178bc28e0f2c6432763bb44fc47b573596387ec241ca45d8775e12af.exe
-
Size
175KB
-
MD5
f69889d705f5d72d65661b48535ae1b3
-
SHA1
4c8f3cf14130e6519339a370bba4527ecb012cde
-
SHA256
153a321e178bc28e0f2c6432763bb44fc47b573596387ec241ca45d8775e12af
-
SHA512
a182272541b22dd58d44db506f0c3368fd0e54d0e616d48b6980563eb12d8d9a377bb0d0272c0c2576d36359f10367e27043d3c3106e5d985be0843112fedb3d
-
SSDEEP
3072:Ke8p6ewdOIwQx76vK/bvTv0cU+lL/dMlZZUZ0b2gT8wARE+WpCc:66ewwIwQJ6vKX0c5MlYZ0b2R
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1