General
-
Target
06022025_1532_CONTRACT_AGREEMENT_PAYMENT_0037836589337_PDF.bat.zip
-
Size
448B
-
Sample
250206-syvv1ayngz
-
MD5
38fb5c76bb23b44fca20d946df317cf1
-
SHA1
4cc88ee4536c2ad4dbd730350f5007b7506f8599
-
SHA256
f37ba407b41367f79349f837edbac14fde9f9e5b0f4f7a2e8363186788c8c9fb
-
SHA512
39cd13f5c1bfa067e4a67eeecabe76d69072a5e8629f9410c3ed0dc0c755db6d14611a6741df922ce632bcad33aaddc48fa98bbf0df29367b7b4325fb2fab709
Static task
static1
Behavioral task
behavioral1
Sample
CONTRACT_AGREEMENT_PAYMENT_0037836589337_PDF.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CONTRACT_AGREEMENT_PAYMENT_0037836589337_PDF.bat
Resource
win10v2004-20250129-en
Malware Config
Extracted
https://igorbende.online/Main/Invoice.exe
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7510448331:AAHCytY6_57dVl2jrU6mtcIyGbcE2spzJjg/sendMessage?chat_id=7068400419
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
CONTRACT_AGREEMENT_PAYMENT_0037836589337_PDF.bat
-
Size
349B
-
MD5
512ff935108c90d1338702a7af2d56f7
-
SHA1
fc9a789bd4811be4dffc04c9475daaad3413e546
-
SHA256
de11223dc99c7be3dab1e860b3c582a138432cf6d234ba335a1f51bd95894579
-
SHA512
6f8c350373e660c0546578039ccf20399ac7fe1eb4037e75124ac6dfbf2e555ffabe0550883bb3a83d7c7665d716bfc9ab379acd7baf559e747eba195da7461f
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1