Behavioral task
behavioral1
Sample
injector by gentusi.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
injector by gentusi.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
otcv4.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
otcv4.dll
Resource
win10v2004-20231215-en
General
-
Target
OneTap v4 injector +.rar
-
Size
6.0MB
-
MD5
6fc7de621ad5692f6cb2097202128275
-
SHA1
04fddd48fe0c72ee3d7b07836fbe307599b4bd76
-
SHA256
a44906d935e447b371ec1274a71aa420ca89dc9c458ce30a860b9304ca3801c8
-
SHA512
24ccbd5c240e3b7101a2e3dedaaff1f9a579ec5c407fe6d076e35b8369e80029f6ce42f8dd44c7b4227afb8f4f631360e827b284e03f8e681a826d2aa4a96ce8
-
SSDEEP
98304:vL5R+K70ZfadX2T7/yvh7NiZ/R9iRqX+duLaldnH5ZG4IYmRYAHbHmOW:X4OXK/qhBiD9iq4UQZG4fFAbW
Malware Config
Signatures
-
StormKitty payload 1 IoCs
resource yara_rule static1/unpack001/injector by gentusi.exe family_stormkitty -
Stormkitty family
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/injector by gentusi.exe unpack001/otcv4.dll
Files
-
OneTap v4 injector +.rar.rar
-
cfg/legit.cfg
-
cfg/rage.cfg
-
injector by gentusi.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 278KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
otcv4.dll.dll windows:6 windows x86 arch:x86
ebebcc504f1ce302539b750e002c57fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
CreateThread
GetProcAddress
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
GetModuleHandleW
DisableThreadLibraryCalls
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
EnterCriticalSection
user32
GetWindowLongW
FindWindowA
gdi32
AddFontMemResourceEx
msvcp140
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
vcruntime140
strstr
__std_exception_copy
memcpy
__std_type_info_destroy_list
_except_handler4_common
_CxxThrowException
__std_exception_destroy
__CxxFrameHandler3
memmove
memset
api-ms-win-crt-heap-l1-1-0
free
_callnewh
malloc
api-ms-win-crt-string-l1-1-0
isdigit
tolower
api-ms-win-crt-runtime-l1-1-0
_initterm
_execute_onexit_table
_register_onexit_function
_seh_filter_dll
_initialize_narrow_environment
_configure_narrow_argv
_initterm_e
_cexit
_crt_atexit
_initialize_onexit_table
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-convert-l1-1-0
strtoul
atoi
Sections
.text Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8.5MB - Virtual size: 8.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Инструкция.txt