General
-
Target
sigma.zip
-
Size
4.5MB
-
Sample
250114-1xr2qa1mgv
-
MD5
1dfeebdf82ab3ed01ddd18ab3a4650fd
-
SHA1
d9be45847f326af2a7a1bf26945b813f1bf8df77
-
SHA256
8aae531dd3a505f3626825ac271c6beec7f25fea3d2c90cb704d9eb9f4ece7f8
-
SHA512
dae196c7db8ed2fbdb8c2e8469c496e48c23ce9eb4d6f31d3468b7cc169489cf1be9967ee104377403b6b53acdc92da9e030a561116eea7c15f8aef92ae1826f
-
SSDEEP
98304:WiMbhvRrGFryU0NBkhoidjUXp5KkNbwBDl5NuMD8Pl4cOVh86y4X:9M3aFrphoPXL5hA8MDbT84X
Behavioral task
behavioral1
Sample
sigma.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sigma.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6930132082:AAF9Abmx5782IJWJVqCaUgCZ8zIA1r0hry0/sendMessage?chat_id=5960891953
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
sigma.zip
-
Size
4.5MB
-
MD5
1dfeebdf82ab3ed01ddd18ab3a4650fd
-
SHA1
d9be45847f326af2a7a1bf26945b813f1bf8df77
-
SHA256
8aae531dd3a505f3626825ac271c6beec7f25fea3d2c90cb704d9eb9f4ece7f8
-
SHA512
dae196c7db8ed2fbdb8c2e8469c496e48c23ce9eb4d6f31d3468b7cc169489cf1be9967ee104377403b6b53acdc92da9e030a561116eea7c15f8aef92ae1826f
-
SSDEEP
98304:WiMbhvRrGFryU0NBkhoidjUXp5KkNbwBDl5NuMD8Pl4cOVh86y4X:9M3aFrphoPXL5hA8MDbT84X
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1