General
-
Target
8eb0decf8260bff5514cdae9f536b7af282c514d2bed4770ce887ac86d767196
-
Size
34.8MB
-
Sample
250325-xt9ktavks2
-
MD5
cb0a22d05978b2e41a38dbc0b8e18519
-
SHA1
c07e0f474595ed1bf9a040b7f72902e32d83cd1a
-
SHA256
8eb0decf8260bff5514cdae9f536b7af282c514d2bed4770ce887ac86d767196
-
SHA512
c92a79e3ed02756d38150edf493cb4df4a61537594bc6c8b926c058a20be4d8041d1e360e8649d2ce2969388f5856fe43d54baf15438bd094df4e672e0faddf8
-
SSDEEP
786432:Wb3crXJY6tIHUrznnbjYWtND+rhvviy2BFo0yqPoYmBR73h5ITWb59ZHWdp:WbsrZY0rznn3YWWlvT27Jo5B9RWTWb5c
Static task
static1
Behavioral task
behavioral1
Sample
8eb0decf8260bff5514cdae9f536b7af282c514d2bed4770ce887ac86d767196.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8eb0decf8260bff5514cdae9f536b7af282c514d2bed4770ce887ac86d767196.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
1.0.7 - modded by last
Default
letaryzipthone.ddns.net:9899
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
RuntimeBroker.exe
-
install_folder
%AppData%
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7375914494:AAFg7abzayPkXsZ-aOwL0bNzXG_Do7nWn34/sendMessage?chat_id=5723422959
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
njrat
0.7d
HacKed
letaryzipthone.ddns.net:4444
2f8a8ccfde8351da368cd6477cb06a99
-
reg_key
2f8a8ccfde8351da368cd6477cb06a99
-
splitter
|'|'|
Targets
-
-
Target
8eb0decf8260bff5514cdae9f536b7af282c514d2bed4770ce887ac86d767196
-
Size
34.8MB
-
MD5
cb0a22d05978b2e41a38dbc0b8e18519
-
SHA1
c07e0f474595ed1bf9a040b7f72902e32d83cd1a
-
SHA256
8eb0decf8260bff5514cdae9f536b7af282c514d2bed4770ce887ac86d767196
-
SHA512
c92a79e3ed02756d38150edf493cb4df4a61537594bc6c8b926c058a20be4d8041d1e360e8649d2ce2969388f5856fe43d54baf15438bd094df4e672e0faddf8
-
SSDEEP
786432:Wb3crXJY6tIHUrznnbjYWtND+rhvviy2BFo0yqPoYmBR73h5ITWb59ZHWdp:WbsrZY0rznn3YWWlvT27Jo5B9RWTWb5c
-
Asyncrat family
-
Njrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1