General
-
Target
index.exe
-
Size
35.9MB
-
Sample
240629-gcsmzasbma
-
MD5
7da5d2ae2b4a21b1777c2fb0ad06d75e
-
SHA1
0c77f532b70f10eadd7853f9a5e42bcc13336133
-
SHA256
a18598cf0f23b0c116ec10204124ad720b4956355effcf0ae0701bbb2a206f29
-
SHA512
bf7fc52213eff12fd22786c4c41adee3e234118f2f6e996146d6b38b9530cd86e5f90931b9d947702f6ae62f25256b9b042080c0e51bd3f1f70ae0be99695272
-
SSDEEP
393216:f1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYf/:fMguj8Q4Vfv+qFTrYP
Static task
static1
Behavioral task
behavioral1
Sample
index.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
index.exe
Resource
win11-20240611-en
Malware Config
Extracted
https://who-olive.gl.at.ply.gg:49036/data
Extracted
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1
Extracted
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1
Targets
-
-
Target
index.exe
-
Size
35.9MB
-
MD5
7da5d2ae2b4a21b1777c2fb0ad06d75e
-
SHA1
0c77f532b70f10eadd7853f9a5e42bcc13336133
-
SHA256
a18598cf0f23b0c116ec10204124ad720b4956355effcf0ae0701bbb2a206f29
-
SHA512
bf7fc52213eff12fd22786c4c41adee3e234118f2f6e996146d6b38b9530cd86e5f90931b9d947702f6ae62f25256b9b042080c0e51bd3f1f70ae0be99695272
-
SSDEEP
393216:f1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYf/:fMguj8Q4Vfv+qFTrYP
Score10/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-