General

  • Target

    7fc8daf832131aa01ee5add4cfd2cde34fe755046297ff91ac455abd8b145189

  • Size

    8.2MB

  • Sample

    250328-ymhdeszzhv

  • MD5

    4e2b434627a5a4ad02832f044c3acbc1

  • SHA1

    3c15ec87b6a5f322a130c7197939a5bacdea088e

  • SHA256

    7fc8daf832131aa01ee5add4cfd2cde34fe755046297ff91ac455abd8b145189

  • SHA512

    e343a187f81dec6aaf6b052e1477df3bd2ec00aa870c07eb1cbbc244e87de02d5ba9db574da92e1282fa070bd138f4ef52a7fc538ba69ae973792a8f24cf08f9

  • SSDEEP

    196608:XM3NdkUBfAB4F0zeZKf3eT3R2iGdQlXSvZyo7t57widdQnIW:c3jkOYBfeZKfIRBGdQlqZllcnV

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7869034897:AAEJf4BzwvPYQzG1jeZLBHwiHFhXCFlDu1I/sendMessage?chat_id=1457932129

https://api.telegram.org/bot8183912070:AAGxwq-YWsMb4FtMiN-pnoAFnMm_DdvDrN8/sendMessage?chat_id=7221408397

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain
1
jLsnCNPOZlAhBfeDALszbFRezwO5zsHr
aes.plain
1
88R6CTij5DlU9Un6u6iN8TyOi5N2XqLB

Targets

    • Target

      Comcast.exe

    • Size

      559KB

    • MD5

      0f0e8dc6228e0872cce9bd634d7f3060

    • SHA1

      08216ff5c764989aa524d267fe57dd219d9a74e0

    • SHA256

      5319207eda6eec62c0d70cee548a2d0eab10ebb3f8e6bb8f721f8f83ec3f9ad4

    • SHA512

      c5eae41ab6af2a4be24aea9a9045852f06cfc07adfc76a2b7eeee530deb0d45eb2e81e886443575fb0a1d389c571642103c47a3c483fec73aedcdc45c7d75180

    • SSDEEP

      6144:k9wxDubaBBOBIIj6HLLYLCYJqvc1D6W5gDp/bzaXVHebdBwcDubaBBOBIIj6HLLo:kba/WKuVHAdB2ba4mky+o64k

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.