General
-
Target
Dll-protected.exe
-
Size
6.0MB
-
Sample
250214-zf52ksyjar
-
MD5
afea16e410aba3018cf34994fc4a927d
-
SHA1
a5034285db7995d9c3354d42dfbe704f1f0c74b3
-
SHA256
7f9c40d5033299845849d6e250d3c5fca50c15470932ea4388e6238e9f6dba90
-
SHA512
de658afe66f7b5f1766d0dbc64d3929b6e17012e3298f927748606f3a3d3d2217459182ae8e337569ce194374c2cbcf120eeed682a23fee6901cb087776b9846
-
SSDEEP
196608:pwZ+KcF6Nw9nPN7xIEDZe9j9du6v++7fN7AszbMq+:BYyf9EjxRr6AIJ
Static task
static1
Behavioral task
behavioral1
Sample
Dll-protected.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Dll-protected.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Dll-protected.exe
-
Size
6.0MB
-
MD5
afea16e410aba3018cf34994fc4a927d
-
SHA1
a5034285db7995d9c3354d42dfbe704f1f0c74b3
-
SHA256
7f9c40d5033299845849d6e250d3c5fca50c15470932ea4388e6238e9f6dba90
-
SHA512
de658afe66f7b5f1766d0dbc64d3929b6e17012e3298f927748606f3a3d3d2217459182ae8e337569ce194374c2cbcf120eeed682a23fee6901cb087776b9846
-
SSDEEP
196608:pwZ+KcF6Nw9nPN7xIEDZe9j9du6v++7fN7AszbMq+:BYyf9EjxRr6AIJ
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
2System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1