General
-
Target
UIServices.exe
-
Size
170KB
-
Sample
250130-rdg8qsvpdj
-
MD5
4376ea4b5ba0f8a061dc18342267e85c
-
SHA1
8d99fa9673835644c641ae4533f005dca4522f6c
-
SHA256
6508dd74c69d399050b07256b4b25cd66cfd774848d55fe330a9d77ad09ce03f
-
SHA512
24811d6dd05df0000b5d0948a833c49ef32a7e5fc3a5cab6c61e9331b6966026f03254eb1a8a9945e8a4e43d1e38bdebed2ec0e8337873de3386c4c4b5bde0a6
-
SSDEEP
3072:++STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cw6+Wp7:j8XN6W8mmHPtppXPSi9b4
Behavioral task
behavioral1
Sample
UIServices.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
UIServices.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6987227198:AAGW8xEs5eNdfO7EF-8152h-RqJkKbn52BE/sendMessage?chat_id=1075483951
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
UIServices.exe
-
Size
170KB
-
MD5
4376ea4b5ba0f8a061dc18342267e85c
-
SHA1
8d99fa9673835644c641ae4533f005dca4522f6c
-
SHA256
6508dd74c69d399050b07256b4b25cd66cfd774848d55fe330a9d77ad09ce03f
-
SHA512
24811d6dd05df0000b5d0948a833c49ef32a7e5fc3a5cab6c61e9331b6966026f03254eb1a8a9945e8a4e43d1e38bdebed2ec0e8337873de3386c4c4b5bde0a6
-
SSDEEP
3072:++STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cw6+Wp7:j8XN6W8mmHPtppXPSi9b4
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1