General
-
Target
7fc8daf832131aa01ee5add4cfd2cde34fe755046297ff91ac455abd8b145189
-
Size
8.2MB
-
Sample
250328-ymhdeszzhv
-
MD5
4e2b434627a5a4ad02832f044c3acbc1
-
SHA1
3c15ec87b6a5f322a130c7197939a5bacdea088e
-
SHA256
7fc8daf832131aa01ee5add4cfd2cde34fe755046297ff91ac455abd8b145189
-
SHA512
e343a187f81dec6aaf6b052e1477df3bd2ec00aa870c07eb1cbbc244e87de02d5ba9db574da92e1282fa070bd138f4ef52a7fc538ba69ae973792a8f24cf08f9
-
SSDEEP
196608:XM3NdkUBfAB4F0zeZKf3eT3R2iGdQlXSvZyo7t57widdQnIW:c3jkOYBfeZKfIRBGdQlqZllcnV
Behavioral task
behavioral1
Sample
Comcast.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Comcast.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7869034897:AAEJf4BzwvPYQzG1jeZLBHwiHFhXCFlDu1I/sendMessage?chat_id=1457932129
https://api.telegram.org/bot8183912070:AAGxwq-YWsMb4FtMiN-pnoAFnMm_DdvDrN8/sendMessage?chat_id=7221408397
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Comcast.exe
-
Size
559KB
-
MD5
0f0e8dc6228e0872cce9bd634d7f3060
-
SHA1
08216ff5c764989aa524d267fe57dd219d9a74e0
-
SHA256
5319207eda6eec62c0d70cee548a2d0eab10ebb3f8e6bb8f721f8f83ec3f9ad4
-
SHA512
c5eae41ab6af2a4be24aea9a9045852f06cfc07adfc76a2b7eeee530deb0d45eb2e81e886443575fb0a1d389c571642103c47a3c483fec73aedcdc45c7d75180
-
SSDEEP
6144:k9wxDubaBBOBIIj6HLLYLCYJqvc1D6W5gDp/bzaXVHebdBwcDubaBBOBIIj6HLLo:kba/WKuVHAdB2ba4mky+o64k
-
Asyncrat family
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1