General
-
Target
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
-
Size
1.0MB
-
Sample
250220-n7jrwavjfw
-
MD5
ac1f0b54a2d984cf1d252e7366882483
-
SHA1
e542633ec13beae03de606f95e8b347846047dae
-
SHA256
7011d49d4411fac299bfdb5063198f2f2c74cc867b4ef57a826beb114c46eb32
-
SHA512
3142a99f7492ae80e15f66215ebe1ce2cecd578187d0ace4fd47f2e964c531bb625be551a9f6c1cae90ee931a82ac8653473eb612fdab4f86988b78eec49a9ee
-
SSDEEP
24576:Pu6J33O0c+JY5UZ+XC0kGso6FaGD7UjAHeWY:5u0c++OCvkGs9FaGDAj4Y
Static task
static1
Behavioral task
behavioral1
Sample
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7774608033:AAE1fvMZ0hM_UWWpPC6wvLbB9fKWjR8j4wA/sendMessage?chat_id=5224323271
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
-
Size
1.0MB
-
MD5
ac1f0b54a2d984cf1d252e7366882483
-
SHA1
e542633ec13beae03de606f95e8b347846047dae
-
SHA256
7011d49d4411fac299bfdb5063198f2f2c74cc867b4ef57a826beb114c46eb32
-
SHA512
3142a99f7492ae80e15f66215ebe1ce2cecd578187d0ace4fd47f2e964c531bb625be551a9f6c1cae90ee931a82ac8653473eb612fdab4f86988b78eec49a9ee
-
SSDEEP
24576:Pu6J33O0c+JY5UZ+XC0kGso6FaGD7UjAHeWY:5u0c++OCvkGs9FaGDAj4Y
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-