Overview
overview
10Static
static
10Kematian-S...ME.ps1
windows7-x64
3Kematian-S...ME.ps1
windows10-2004-x64
3Kematian-S...er.bat
windows7-x64
1Kematian-S...er.bat
windows10-2004-x64
1Kematian-S...est.py
windows7-x64
3Kematian-S...est.py
windows10-2004-x64
3Kematian-S...vm.ps1
windows7-x64
3Kematian-S...vm.ps1
windows10-2004-x64
3Kematian-S...un.ps1
windows7-x64
3Kematian-S...un.ps1
windows10-2004-x64
6Kematian-S...ts.ps1
windows7-x64
8Kematian-S...ts.ps1
windows10-2004-x64
8Kematian-S...ion.js
windows7-x64
3Kematian-S...ion.js
windows10-2004-x64
3Kematian-S...de.ps1
windows7-x64
3Kematian-S...de.ps1
windows10-2004-x64
8Kematian-S...in.bat
windows7-x64
3Kematian-S...in.bat
windows10-2004-x64
10Kematian-S...in.ps1
windows7-x64
3Kematian-S...in.ps1
windows10-2004-x64
8Kematian-S...am.ps1
windows7-x64
3Kematian-S...am.ps1
windows10-2004-x64
3Kematian-S...mon.js
windows7-x64
3Kematian-S...mon.js
windows10-2004-x64
3Kematian-S...ld.bat
windows7-x64
1Kematian-S...ld.bat
windows10-2004-x64
1Kematian-S...ain.py
windows7-x64
3Kematian-S...ain.py
windows10-2004-x64
3Kematian-S...ver.py
windows7-x64
3Kematian-S...ver.py
windows10-2004-x64
3Kematian-S...ler.py
windows7-x64
3Kematian-S...ler.py
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
Kematian-Stealer-main/README.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Kematian-Stealer-main/README.ps1
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
Kematian-Stealer-main/builder.bat
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Kematian-Stealer-main/builder.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
Kematian-Stealer-main/conftest.py
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Kematian-Stealer-main/conftest.py
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
Kematian-Stealer-main/frontend-src/antivm.ps1
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Kematian-Stealer-main/frontend-src/antivm.ps1
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
Kematian-Stealer-main/frontend-src/autorun.ps1
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
Kematian-Stealer-main/frontend-src/autorun.ps1
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Kematian-Stealer-main/frontend-src/blockhosts.ps1
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Kematian-Stealer-main/frontend-src/blockhosts.ps1
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
Kematian-Stealer-main/frontend-src/injection.js
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Kematian-Stealer-main/frontend-src/injection.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
Kematian-Stealer-main/frontend-src/kematian_shellcode.ps1
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Kematian-Stealer-main/frontend-src/kematian_shellcode.ps1
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
Kematian-Stealer-main/frontend-src/main.bat
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Kematian-Stealer-main/frontend-src/main.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
Kematian-Stealer-main/frontend-src/main.ps1
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
Kematian-Stealer-main/frontend-src/main.ps1
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
Kematian-Stealer-main/frontend-src/webcam.ps1
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Kematian-Stealer-main/frontend-src/webcam.ps1
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
Kematian-Stealer-main/kematian-src/browsers/util/common.js
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Kematian-Stealer-main/kematian-src/browsers/util/common.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
Kematian-Stealer-main/kematian-src/build.bat
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Kematian-Stealer-main/kematian-src/build.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
Kematian-Stealer-main/main.py
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
Kematian-Stealer-main/main.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Kematian-Stealer-main/panel/server.py
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Kematian-Stealer-main/panel/server.py
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
Kematian-Stealer-main/panel/ui/handlers/logs_handler.py
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Kematian-Stealer-main/panel/ui/handlers/logs_handler.py
Resource
win10v2004-20240704-en
General
-
Target
Kematian-Stealer-main/frontend-src/webcam.ps1
-
Size
6KB
-
MD5
75846ce1e77e07545629a87ac9bc4a2b
-
SHA1
d27af6c792327bf5832148c6797cd88dac333baa
-
SHA256
b94954783a3a0c42d37cd001fce737c66790f69d3566ab7aa3fcbca8e1bb5536
-
SHA512
6e559aba3fab78186b75ba9b393b919caf2890e2184343473eca8fdb59d6f143c978ad892ca99e85a3bb8de9d04366752a3f137aea13502b76951560d80e6846
-
SSDEEP
96:iPL4W84Ji4AnzvN0OpVDUNKMiNjHJ4OY492VXyNbEqbIQH9idwO3Kglh:isqHeVRV4oMiNjHJu/VCNIgH9MwO3Kyh
Malware Config
Signatures
-
pid Process 2056 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2056 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2056 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2612 2056 powershell.exe 29 PID 2056 wrote to memory of 2612 2056 powershell.exe 29 PID 2056 wrote to memory of 2612 2056 powershell.exe 29 PID 2612 wrote to memory of 2688 2612 csc.exe 30 PID 2612 wrote to memory of 2688 2612 csc.exe 30 PID 2612 wrote to memory of 2688 2612 csc.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Kematian-Stealer-main\frontend-src\webcam.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xo_yqmbw.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES250F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC250E.tmp"3⤵PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cc8b20aba233536ea4ae1558105b0ca5
SHA1ae3e7360d590610a974ee5c2c03caf88c505b137
SHA2565ab6ccda0b3e00b322a70a326e7f1d3ddaa4afec23de42d5012c33d079fc1bed
SHA512cd3282ad36741517b4f1feb0e2d5b88b83902cef2340a09834c3b8a83fbbbdf18a66cae762c6b1a3429d1d9e9b2a90a5d181a6c16e8136ec3a8656bc48897301
-
Filesize
6KB
MD592534f020b8c8953d0cf1365df75e6be
SHA1bc68621eae220637fe2272d2173fccf32c7f41fa
SHA2568063bea5674afe0943761b209dc437059b29f905cf814303df48aae6e7637404
SHA512406d146a67caa2deb0f1300f4beeb1ffb3625028505f34fd9b105d48c665cde02fb5018cc4c37c7659e77bb751c59671058f909b15a05f23e0c3e80aaff6783c
-
Filesize
15KB
MD59ad71a5a0f6704db55c10eb4a8b45396
SHA1bf8923a409ad8aa8213f8523054663e93f45b985
SHA2564254b6facb5f529a8cea21ed40d0a01ab827ba5edca8319e39371eed5eb0c42c
SHA512273b85406858e5ab1b92f0907eeb35859878186c34bc78c616e96db33b7308ff0aec8386d1572ab93b88780e25fec66518117726984274a3a09c653652228213
-
Filesize
652B
MD5f92a6e34596564173c7d994f7f9f7cee
SHA18235032231307da5c157e38fcec571056317bd01
SHA25683b95280b235ef0cd9d4bc89ec789b4834dbb9ee6b80d63df9b1a10960fdf356
SHA51234470234b3c0171bf176523a6b25df55967f5615d3527c318775960ae7561211ef8b0ec6b00b2c0a357b803de6d1882790d9e8b95f1a7a06edc446730a61dbb0
-
Filesize
4KB
MD52a829317f65fea84eb85cb2376fa9e21
SHA12f223ea8738f9989385e93b9c8cf0e8fc5e30700
SHA256f99c46f447010a438586651fcdf9068394926247bf7656980fee066b2069fe8f
SHA512a438c35327297431df19fe50683619f78ea0245bb8d3aa7553c376c365b927747d8cb8343fc2cfb4de884dad4eb6166589afc98eba385137bb3405998838ace0
-
Filesize
595B
MD593f1802e74bc5671c0a8dc451424bde6
SHA13cc33d41a57b1253827ae9ef4bfbf25048cafb88
SHA256ca01bb47fc4b9d4f452f68d1ae63b166a591258de06f109049d7041570b9267a
SHA5125a010acc854460762a688828bd22b1b5cbd9bfd41c4806e7975d38341feb69817b626da606579be5656521169de266afc0f490638d7e3a219767a8399680dc33