General
-
Target
kdot.ps1
-
Size
74KB
-
Sample
240705-tpde2atfjb
-
MD5
0cb37de329eed6ef83d5da40ffcd03cc
-
SHA1
9713568bc1a290eca44e98dc883d3e431a3e6889
-
SHA256
06aa6e3b7c70a33192655104272687e631ef0fa1d7ba78a582ebe8c47cc3cad4
-
SHA512
6e6376729fe7b58cc281214368333f00a230d4279a50ee8bbc83f1c3041f1e2211e963b584493e029a60f972841d79d0ee29b9b91a6d281a2341b08f9c47b92b
-
SSDEEP
1536:1SDVn5ahg5yYp6zdv/5l05Qo8l01zhwZPhZcLcJS7srHX6Cx:1SDVn5Uwiv/5IQo8l01zhw5hUc9KCx
Static task
static1
Behavioral task
behavioral1
Sample
kdot.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
kdot.ps1
Resource
win10v2004-20240704-en
Malware Config
Extracted
https://users-arg.gl.at.ply.gg:59170/data
Extracted
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1
Extracted
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1
Targets
-
-
Target
kdot.ps1
-
Size
74KB
-
MD5
0cb37de329eed6ef83d5da40ffcd03cc
-
SHA1
9713568bc1a290eca44e98dc883d3e431a3e6889
-
SHA256
06aa6e3b7c70a33192655104272687e631ef0fa1d7ba78a582ebe8c47cc3cad4
-
SHA512
6e6376729fe7b58cc281214368333f00a230d4279a50ee8bbc83f1c3041f1e2211e963b584493e029a60f972841d79d0ee29b9b91a6d281a2341b08f9c47b92b
-
SSDEEP
1536:1SDVn5ahg5yYp6zdv/5l05Qo8l01zhwZPhZcLcJS7srHX6Cx:1SDVn5Uwiv/5IQo8l01zhw5hUc9KCx
Score10/10-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-