General

  • Target

    PryntVirus.exe.zip

  • Size

    81KB

  • Sample

    250115-r17f5sxjhj

  • MD5

    823f2554fd64d97de66fa281806c21e5

  • SHA1

    84005713be2b5799a4d93ad103a22c4496867fd9

  • SHA256

    fd0d9cf1b0714abdff0365a0d0e406cb7204ed272b4101c355698d87c831f6b9

  • SHA512

    43032b5b65cd5ca6fc5f7c276e829c805ad89a2e433e9fd5511047d2e7e4da2e3b16cf2c910e680d5a642a4527b93c5a62b895145d6d0e8c37f37387067189d9

  • SSDEEP

    1536:mVp85vTHeEHF5v7lGOo7rw5fLjmWtNOl8KxIm1+wsJZ5IwKKA:mV2TeEjv7MOoYVWlzxImUWiA

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7632590974:AAH3TGb_QzmOcupCJLey_TtoLlCaX1M_Kvc/sendMessage?chat_id=7491284773

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      PryntVirus.exe.bin

    • Size

      175KB

    • MD5

      94536fed6b981091c2e9e8588e302c79

    • SHA1

      0f7db7625c22ffd146511e4350006a5813948ce6

    • SHA256

      914b43ad3b1faccc2fb2c049875bb0203065912520c6e1b56d3578ed897f759b

    • SHA512

      5c73c861f49c282b8ac5cfc4a5921f77042745fe26e3aca3e34b54c24c6d58b6c895046e52b294d69315719d70eae2775f9895114a0ecec46f7d74a9b13851b6

    • SSDEEP

      3072:U+lBDp+LQ1/fU2RSIIj6hLLYLCYJqvc1DfDTwYhac4IauJX9bj72d6MOINQ+WpW0:FD8u/fdRSIIj6hLLYLCYJqvc1DfXwYho

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks