General
-
Target
97fe5fd73167841cc6a5db478b5278675a486cc46c25895e395c90e581aeeab6
-
Size
175KB
-
Sample
250330-xsflcaxk14
-
MD5
6f55f573d7be6673a30fb19acf36e000
-
SHA1
aab2c19cb382f2fefce7e1c49a6f3429657205e9
-
SHA256
97fe5fd73167841cc6a5db478b5278675a486cc46c25895e395c90e581aeeab6
-
SHA512
676a77d7b150665b693cb176d5f07266f0500af8eebc8c64ca4e39a2a0f073413e227c758c75fc3238cbbede19f74e4b69baad4f9c2658695a53be5f2663214a
-
SSDEEP
3072:ae8oX8Sb5KcXrtkkXmf/bDsvqtU+lLToChAP0UZ0b2gT5wAqE+Wpor:bXtb5KcXr7XmfgqtjhAxZ0b26
Behavioral task
behavioral1
Sample
97fe5fd73167841cc6a5db478b5278675a486cc46c25895e395c90e581aeeab6.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
97fe5fd73167841cc6a5db478b5278675a486cc46c25895e395c90e581aeeab6.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7636279565:AAFfbV9wqzcTb1Fa4IkguermnQhZKwCqJSo/sendMessage?chat_id=7913121735
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
97fe5fd73167841cc6a5db478b5278675a486cc46c25895e395c90e581aeeab6
-
Size
175KB
-
MD5
6f55f573d7be6673a30fb19acf36e000
-
SHA1
aab2c19cb382f2fefce7e1c49a6f3429657205e9
-
SHA256
97fe5fd73167841cc6a5db478b5278675a486cc46c25895e395c90e581aeeab6
-
SHA512
676a77d7b150665b693cb176d5f07266f0500af8eebc8c64ca4e39a2a0f073413e227c758c75fc3238cbbede19f74e4b69baad4f9c2658695a53be5f2663214a
-
SSDEEP
3072:ae8oX8Sb5KcXrtkkXmf/bDsvqtU+lLToChAP0UZ0b2gT5wAqE+Wpor:bXtb5KcXr7XmfgqtjhAxZ0b26
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1