General

  • Target

    SecuriteInfo.com.Win32.Malware-gen.25058.13399.exe

  • Size

    3.4MB

  • Sample

    250419-zxsgtaxmt3

  • MD5

    6ed6568f5678097a4a7e1d0877075819

  • SHA1

    6fd47e4ac5365ebf227166a2a1269ec48b60f135

  • SHA256

    befd287cf0e7ea186b496d2db1351ae25d279fa362babe0e0c0a00cb03287111

  • SHA512

    f7be525a6f7d3b2d6cebf4f862d93fac2bcd6ca1be9114d0c7c11b65b94bfdf293784f76f25adea2c21b71ff96e0ab8fcddd6227176a759434e4042c2214833c

  • SSDEEP

    49152:s/bgi7jBAFPnLbfDMmYcclPpi8XFkwITX8BKg7bVAhmQD8xDhJWbWCTwx0RtXffk:s7OLb7ZpAw8VpmLgXVAhdIYSzL/hMQeg

Malware Config

Targets

    • Target

      SecuriteInfo.com.Win32.Malware-gen.25058.13399.exe

    • Size

      3.4MB

    • MD5

      6ed6568f5678097a4a7e1d0877075819

    • SHA1

      6fd47e4ac5365ebf227166a2a1269ec48b60f135

    • SHA256

      befd287cf0e7ea186b496d2db1351ae25d279fa362babe0e0c0a00cb03287111

    • SHA512

      f7be525a6f7d3b2d6cebf4f862d93fac2bcd6ca1be9114d0c7c11b65b94bfdf293784f76f25adea2c21b71ff96e0ab8fcddd6227176a759434e4042c2214833c

    • SSDEEP

      49152:s/bgi7jBAFPnLbfDMmYcclPpi8XFkwITX8BKg7bVAhmQD8xDhJWbWCTwx0RtXffk:s7OLb7ZpAw8VpmLgXVAhdIYSzL/hMQeg

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v16

Tasks