Malware Analysis Report

2024-09-11 02:37

Sample ID 220124-f699fachal
Target b75fbe3b21d83e2000928349d1610f292e1a4c072fd0454309fe1c6c7d85ff46
SHA256 b75fbe3b21d83e2000928349d1610f292e1a4c072fd0454309fe1c6c7d85ff46
Tags
strongpity suricata
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b75fbe3b21d83e2000928349d1610f292e1a4c072fd0454309fe1c6c7d85ff46

Threat Level: Known bad

The file b75fbe3b21d83e2000928349d1610f292e1a4c072fd0454309fe1c6c7d85ff46 was found to be: Known bad.

Malicious Activity Summary

strongpity suricata

Strongpity family

suricata: ET MALWARE StrongPity CnC Domain Observed in DNS Query

StrongPity Spyware

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2022-01-24 05:30

Signatures

StrongPity Spyware

Description Indicator Process Target
N/A N/A N/A N/A

Strongpity family

strongpity

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-24 05:30

Reported

2022-01-24 05:49

Platform

win7-en-20211208

Max time kernel

150s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b75fbe3b21d83e2000928349d1610f292e1a4c072fd0454309fe1c6c7d85ff46.exe"

Signatures

suricata: ET MALWARE StrongPity CnC Domain Observed in DNS Query

suricata

Processes

C:\Users\Admin\AppData\Local\Temp\b75fbe3b21d83e2000928349d1610f292e1a4c072fd0454309fe1c6c7d85ff46.exe

"C:\Users\Admin\AppData\Local\Temp\b75fbe3b21d83e2000928349d1610f292e1a4c072fd0454309fe1c6c7d85ff46.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 upd32-secure-serv4.com udp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-01-24 05:30

Reported

2022-01-24 05:48

Platform

win10-en-20211208

Max time kernel

159s

Max time network

162s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b75fbe3b21d83e2000928349d1610f292e1a4c072fd0454309fe1c6c7d85ff46.exe"

Signatures

suricata: ET MALWARE StrongPity CnC Domain Observed in DNS Query

suricata

Processes

C:\Users\Admin\AppData\Local\Temp\b75fbe3b21d83e2000928349d1610f292e1a4c072fd0454309fe1c6c7d85ff46.exe

"C:\Users\Admin\AppData\Local\Temp\b75fbe3b21d83e2000928349d1610f292e1a4c072fd0454309fe1c6c7d85ff46.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 upd32-secure-serv4.com udp
US 8.8.8.8:53 upd32-secure-serv4.com udp
US 8.8.8.8:53 upd32-secure-serv4.com udp
US 8.8.8.8:53 upd32-secure-serv4.com udp
US 8.8.8.8:53 upd32-secure-serv4.com udp
US 8.8.8.8:53 upd32-secure-serv4.com udp
US 8.8.8.8:53 upd32-secure-serv4.com udp
US 8.8.8.8:53 upd32-secure-serv4.com udp
US 8.8.8.8:53 upd32-secure-serv4.com udp
US 8.8.8.8:53 upd32-secure-serv4.com udp
US 8.8.8.8:53 udp

Files

N/A