General
-
Target
Infected.exe
-
Size
63KB
-
Sample
250216-cwqkhaxlbr
-
MD5
caa7283ab71204b4b747a7f35f9d8a9b
-
SHA1
6373f0c8341dc5fb5e6ba98e366c7ac061ddf2b9
-
SHA256
12398cccbc75380eff65f0d6c44df75ff13dc4fef06f40fd558b7f4cfdf1bc7b
-
SHA512
b6bdbbc5669ed35f3ffdcfda790ee09ae452a24b68e3055f53822acf7b0da2fad1ac6ee6ecacbcb37df06c98d86d6c5e88ab696189c92cc23ba57c4331bd2e00
-
SSDEEP
768:l/XgYSjOTc+O78SAC8A+XO6azcBRL5JTk1+T4KSBGHmDbD/ph0oXpXPSu9ydpqKX:l4N+ltdSJYUbdh9pX6u9ydpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:53648
letter-organisms.gl.at.ply.gg:53648
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
caa7283ab71204b4b747a7f35f9d8a9b
-
SHA1
6373f0c8341dc5fb5e6ba98e366c7ac061ddf2b9
-
SHA256
12398cccbc75380eff65f0d6c44df75ff13dc4fef06f40fd558b7f4cfdf1bc7b
-
SHA512
b6bdbbc5669ed35f3ffdcfda790ee09ae452a24b68e3055f53822acf7b0da2fad1ac6ee6ecacbcb37df06c98d86d6c5e88ab696189c92cc23ba57c4331bd2e00
-
SSDEEP
768:l/XgYSjOTc+O78SAC8A+XO6azcBRL5JTk1+T4KSBGHmDbD/ph0oXpXPSu9ydpqKX:l4N+ltdSJYUbdh9pX6u9ydpqKmY7
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Downloads MZ/PE file
-
Deletes itself
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1