General
-
Target
95f4403c67475746690d2dd308a51193d17d424f974cfe8f8eb4ab436c14bde3
-
Size
192KB
-
Sample
250204-c1g4xssjdz
-
MD5
b5df32f1b9e18ed212c0a4ee337936cf
-
SHA1
bc8a6c9773d41252ecce5d7302b41a66a6585f45
-
SHA256
95f4403c67475746690d2dd308a51193d17d424f974cfe8f8eb4ab436c14bde3
-
SHA512
cdf102f6d2ac3bd9c6d0e8582a1f208622132fea984c5359e01a0ced939946bbd76f183d828f9cfec4a364334148a5ec68843ebe6390ebb632da5f0425cb69f9
-
SSDEEP
3072:a1BDU4yRhDeFidbfRbTFlSC5oNMa/6yEtyQTefQ+vw/IqlLxXL+LRIHNM9LPsZ:aD/CeUNdFlScoN/xEtyBelLg9IHW9LP
Static task
static1
Behavioral task
behavioral1
Sample
95f4403c67475746690d2dd308a51193d17d424f974cfe8f8eb4ab436c14bde3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
95f4403c67475746690d2dd308a51193d17d424f974cfe8f8eb4ab436c14bde3.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7874496080:AAGuPYfNep3wFkcSC3Q_wev1OwFHhNk_Jak/sendMessage?chat_id=979652778
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
95f4403c67475746690d2dd308a51193d17d424f974cfe8f8eb4ab436c14bde3
-
Size
192KB
-
MD5
b5df32f1b9e18ed212c0a4ee337936cf
-
SHA1
bc8a6c9773d41252ecce5d7302b41a66a6585f45
-
SHA256
95f4403c67475746690d2dd308a51193d17d424f974cfe8f8eb4ab436c14bde3
-
SHA512
cdf102f6d2ac3bd9c6d0e8582a1f208622132fea984c5359e01a0ced939946bbd76f183d828f9cfec4a364334148a5ec68843ebe6390ebb632da5f0425cb69f9
-
SSDEEP
3072:a1BDU4yRhDeFidbfRbTFlSC5oNMa/6yEtyQTefQ+vw/IqlLxXL+LRIHNM9LPsZ:aD/CeUNdFlScoN/xEtyBelLg9IHW9LP
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1