Overview
overview
10Static
static
10net8.0-win...er.exe
windows7-x64
1net8.0-win...er.exe
windows10-2004-x64
1net8.0-win...er.exe
windows7-x64
3net8.0-win...er.exe
windows10-2004-x64
7net8.0-win...ion.js
windows7-x64
3net8.0-win...ion.js
windows10-2004-x64
3net8.0-win...ion.py
windows7-x64
3net8.0-win...ion.py
windows10-2004-x64
3net8.0-win...px.exe
windows7-x64
5net8.0-win...px.exe
windows10-2004-x64
5net8.0-win...I2.dll
windows7-x64
1net8.0-win...I2.dll
windows10-2004-x64
1net8.0-win...on.dll
windows7-x64
1net8.0-win...on.dll
windows10-2004-x64
1net8.0-win...nt.dll
windows7-x64
1net8.0-win...nt.dll
windows10-2004-x64
1net8.0-win...on.bat
windows7-x64
1net8.0-win...on.bat
windows10-2004-x64
8net8.0-win...ll.bat
windows7-x64
1net8.0-win...ll.bat
windows10-2004-x64
1net8.0-win...nt.dll
windows7-x64
3net8.0-win...nt.dll
windows10-2004-x64
3Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2025, 13:52 UTC
Behavioral task
behavioral1
Sample
net8.0-windows/Astral Stealer.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
net8.0-windows/Astral Stealer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
net8.0-windows/Astral Stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
net8.0-windows/Astral Stealer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
net8.0-windows/Astral_assets/Injection/discord-injection.js
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
net8.0-windows/Astral_assets/Injection/discord-injection.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
net8.0-windows/Astral_assets/obfuscation/obfuscation.py
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
net8.0-windows/Astral_assets/obfuscation/obfuscation.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
net8.0-windows/Astral_assets/upx/upx.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
net8.0-windows/Astral_assets/upx/upx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
net8.0-windows/Guna.UI2.dll
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
net8.0-windows/Guna.UI2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
net8.0-windows/Newtonsoft.Json.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
net8.0-windows/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
net8.0-windows/System.Management.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
net8.0-windows/System.Management.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
net8.0-windows/install-python.bat
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
net8.0-windows/install-python.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
net8.0-windows/install.bat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
net8.0-windows/install.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
net8.0-windows/runtimes/win/lib/net7.0/System.Management.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
net8.0-windows/runtimes/win/lib/net7.0/System.Management.dll
Resource
win10v2004-20241007-en
General
-
Target
net8.0-windows/Astral Stealer.exe
-
Size
139KB
-
MD5
726c717d3e26f216b316f169ae4befd2
-
SHA1
673efa718917cfd5685a3fa91f8ca0607ee59bda
-
SHA256
1e7a930303762a3a1f8678da099225d9276d1a9fa16ced07a9fb4f14e0201bd9
-
SHA512
2438ec07d41d19f7c4aa1885408784f5d68bcf979b5481cf0de14bfdb5d91d9b96ef6d651291733e4141e4b8f23bbb139baa04ebb92033ca9c4b9797519adb52
-
SSDEEP
3072:PiS4omp03WQthI/9S3BZi08iRQ1G78IVn2sbS7cJp8lt2:PiS4ompB9S3BZi0a1G78IVAcLct
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Astral Stealer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Astral Stealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Astral Stealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Astral Stealer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\TypedURLs Astral Stealer.exe
Processes
Network
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request188.77.23.2.in-addr.arpaIN PTRResponse188.77.23.2.in-addr.arpaIN PTRa2-23-77-188deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request203.109.54.23.in-addr.arpaIN PTRResponse203.109.54.23.in-addr.arpaIN PTRa23-54-109-203deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTR
-
72 B 158 B 1 1
DNS Request
241.150.49.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
188.77.23.2.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
203.109.54.23.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
70 B 1
DNS Request
18.31.95.13.in-addr.arpa