General
-
Target
ezrzke.zip
-
Size
1.7MB
-
Sample
240709-nvvnlssdmp
-
MD5
6f186c2e5e4278db22b90913ff26b262
-
SHA1
50c8ffee9a57e68df794442677ea2e1d8de7ed45
-
SHA256
9d150db04aa61bfb2593212adfd6132101c5338270a08f115073ad149d509642
-
SHA512
e07ce98dc70f9e458d9b94ab427751f357e163aabcdbc0f1c86b8d0c941c8eaf333ad7d9208a44e6ebd0c89c2316445f3e90cc1a8fc3c74b8e277a7c360c47c1
-
SSDEEP
49152:MthuGo0bNaxoYeQ1S5XOrSgMoBpFTKPQNJNqrv:MtI70bkfH1xrSCbNJoj
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume4/Users/dagners/Downloads/Stormshot.PC.V1.0_214895962f.exe
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
Device/HarddiskVolume4/Users/dagners/Downloads/Stormshot.PC.V1.0_214895962f.exe
-
Size
2.8MB
-
MD5
6aae47cbaa4c56095a1eb0422c1d2ecb
-
SHA1
34e29d1801d270a2bd7ac02d4ea84c14c553d66f
-
SHA256
ffd63fe2aeaa91f05bef47b3583290ccdba3f44912ab8b67044f3d58bf817ebf
-
SHA512
d6b2406922d2618816db55110bf12a8579b69325e0c196d0d2508bafec68a0430acf48482160bf42cca4bd0995d864abfa2425e8e5af794c8d8d1c430fee4cff
-
SSDEEP
49152:c8ZQVqWu+fqu79LNTRBO1L2VQjJY80KruthaPVu+2zE0y5VCmdAlacRk3Y:vZARtBEqVQq80ThzTzEElask3Y
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1