General
-
Target
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
-
Size
1.0MB
-
Sample
250221-h5lwkayjx6
-
MD5
00b9f2b546739c96003df5788c64a55a
-
SHA1
6ea78affd796ffadf558ee3b4259b1503eb071b6
-
SHA256
35ee14c91d35064c52f7bada9c45742fe9a2da872ee7ceb06018dad9ca9217dc
-
SHA512
d8df3343e011e0c60bb9aed39536cc00bbffd6675fdbb52ad1671de0ed1124b4b6cfc43e53abb1411068ff5a40d24e959ee49cec3b265170e01ba71664a55f98
-
SSDEEP
24576:Mu6J33O0c+JY5UZ+XC0kGso6FaYEIIrebsWY:Wu0c++OCvkGs9FaYEI/7Y
Static task
static1
Behavioral task
behavioral1
Sample
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7774608033:AAE1fvMZ0hM_UWWpPC6wvLbB9fKWjR8j4wA/sendMessage?chat_id=5224323271
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
-
Size
1.0MB
-
MD5
00b9f2b546739c96003df5788c64a55a
-
SHA1
6ea78affd796ffadf558ee3b4259b1503eb071b6
-
SHA256
35ee14c91d35064c52f7bada9c45742fe9a2da872ee7ceb06018dad9ca9217dc
-
SHA512
d8df3343e011e0c60bb9aed39536cc00bbffd6675fdbb52ad1671de0ed1124b4b6cfc43e53abb1411068ff5a40d24e959ee49cec3b265170e01ba71664a55f98
-
SSDEEP
24576:Mu6J33O0c+JY5UZ+XC0kGso6FaYEIIrebsWY:Wu0c++OCvkGs9FaYEI/7Y
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-