General
-
Target
850fa36792359354c8b5cf86ebb2d6923aa64dece7fc5d555d90d156eaa0409e.exe
-
Size
1.1MB
-
Sample
250111-ewb38atkcv
-
MD5
a7649256fce8b15959edd1004df7781b
-
SHA1
314294d940b110265283531e9e62b3dea6fb4506
-
SHA256
850fa36792359354c8b5cf86ebb2d6923aa64dece7fc5d555d90d156eaa0409e
-
SHA512
8b06a739f05a731d7edafe7bbc9b6a6e083dbb3d8d96fe1bba110147401caf8bd1b51268cf1db0ad15dbd92b584c3a3d6174dfdee47669b9f8b6510735c4cf5b
-
SSDEEP
24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8a61V9rWmEbmJsR:2TvC/MTQYxsWR7a6H9rbESJ
Static task
static1
Behavioral task
behavioral1
Sample
850fa36792359354c8b5cf86ebb2d6923aa64dece7fc5d555d90d156eaa0409e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
850fa36792359354c8b5cf86ebb2d6923aa64dece7fc5d555d90d156eaa0409e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7935009733:AAGBu91qWsmUHTs2GabvLt2Z62A3M4QqyqE/sendMessage?chat_id=6779103906
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
850fa36792359354c8b5cf86ebb2d6923aa64dece7fc5d555d90d156eaa0409e.exe
-
Size
1.1MB
-
MD5
a7649256fce8b15959edd1004df7781b
-
SHA1
314294d940b110265283531e9e62b3dea6fb4506
-
SHA256
850fa36792359354c8b5cf86ebb2d6923aa64dece7fc5d555d90d156eaa0409e
-
SHA512
8b06a739f05a731d7edafe7bbc9b6a6e083dbb3d8d96fe1bba110147401caf8bd1b51268cf1db0ad15dbd92b584c3a3d6174dfdee47669b9f8b6510735c4cf5b
-
SSDEEP
24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8a61V9rWmEbmJsR:2TvC/MTQYxsWR7a6H9rbESJ
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-