Resubmissions

21/05/2023, 14:16

230521-rlc9raae36 10

21/05/2023, 14:13

230521-rjf8madb71 10

General

  • Target

    extreme injector v3.exe

  • Size

    55.0MB

  • MD5

    3a4c0aa281cc44b58d928f1b21ee173f

  • SHA1

    0f974fcf284c110476966c995cc1fe50220d065d

  • SHA256

    e48a4f7c9a5eb6874ce62280af5cdc7a3bd1ef7a06dec2d42149b368b0f723c2

  • SHA512

    35a145fa36bb5c590acbdab4e16732e5d00b94be9f257b9d482f862e0899904179878ce7083ea2248938806bcafbed0ae75da585b086682a3c525d1161b5021d

  • SSDEEP

    1536:hAMfrTX01OrGpRZNdbv66Claewnph6Nu3qdMKvLfHipmvf9b8NZ9VxjDkOeN+:0DewnphbkTHigf9b6DhDkOew

Score
10/10

Malware Config

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • extreme injector v3.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections