Overview
overview
10Static
static
3e1e6a513ab...80.exe
windows7-x64
10e1e6a513ab...80.exe
windows10-2004-x64
10e1e6a513ab...80.exe
android-9-x86
e1e6a513ab...80.exe
android-10-x64
e1e6a513ab...80.exe
android-11-x64
e1e6a513ab...80.exe
macos-10.15-amd64
e1e6a513ab...80.exe
ubuntu-18.04-amd64
e1e6a513ab...80.exe
debian-9-armhf
e1e6a513ab...80.exe
debian-9-mips
e1e6a513ab...80.exe
debian-9-mipsel
General
-
Target
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
-
Size
760KB
-
Sample
250112-pt27qssmew
-
MD5
d2b8506820fe3c39b6b5e891170f3451
-
SHA1
30f6fa21f06d99b0254fa1ff387c45921317eda7
-
SHA256
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480
-
SHA512
15b10c694ff797b8ffbcde18752c2df2d16f961d367794df7f8932bb5bc861faef9984b6b780910eb28c5e1caaa302a0d39d9ca44fb988e84a232d24b7f28781
-
SSDEEP
12288:YjlIpHtMPku+l0CPPoJts5Pic17D44ehsA4iFMZUiqrbA8yJNB:YjlIhSPd+pWtAPic17Dehx442B
Static task
static1
Behavioral task
behavioral1
Sample
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral6
Sample
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
Resource
macos-20241101-en
Behavioral task
behavioral7
Sample
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral10
Sample
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
Resource
debian9-mipsel-20240611-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6331768257:AAE1Rrc3F4A-nTJkfXEukNBriTate8i72L8/sendMessage?chat_id=5287158069
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480.exe
-
Size
760KB
-
MD5
d2b8506820fe3c39b6b5e891170f3451
-
SHA1
30f6fa21f06d99b0254fa1ff387c45921317eda7
-
SHA256
e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480
-
SHA512
15b10c694ff797b8ffbcde18752c2df2d16f961d367794df7f8932bb5bc861faef9984b6b780910eb28c5e1caaa302a0d39d9ca44fb988e84a232d24b7f28781
-
SSDEEP
12288:YjlIpHtMPku+l0CPPoJts5Pic17D44ehsA4iFMZUiqrbA8yJNB:YjlIhSPd+pWtAPic17Dehx442B
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1