Overview
overview
10Static
static
10BEST NEW R...RTB.py
windows11-21h2-x64
4BEST NEW R...10.pyc
windows11-21h2-x64
3BEST NEW R...39.pyc
windows11-21h2-x64
3BEST NEW R...her.py
windows11-21h2-x64
3BEST NEW R...GUI.py
windows11-21h2-x64
3BEST NEW R...fig.py
windows11-21h2-x64
3BEST NEW R...10.pyc
windows11-21h2-x64
3BEST NEW R...39.pyc
windows11-21h2-x64
3BEST NEW R...ler.py
windows11-21h2-x64
3BEST NEW R...ict.py
windows11-21h2-x64
3BEST NEW R...nup.py
windows11-21h2-x64
3BEST NEW R...ose.py
windows11-21h2-x64
3BEST NEW R...lay.py
windows11-21h2-x64
3BEST NEW R...yer.py
windows11-21h2-x64
3BEST NEW R...pam.py
windows11-21h2-x64
3BEST NEW R...er .py
windows11-21h2-x64
3BEST NEW R...er.exe
windows11-21h2-x64
1BEST NEW R...e1.exe
windows11-21h2-x64
10BEST NEW R...pam.py
windows11-21h2-x64
3BEST NEW R...sta.py
windows11-21h2-x64
3BEST NEW R...ker.py
windows11-21h2-x64
3BEST NEW R...enu.py
windows11-21h2-x64
3BEST NEW R...gin.py
windows11-21h2-x64
3BEST NEW R...gin.py
windows11-21h2-x64
3BEST NEW R...10.pyc
windows11-21h2-x64
3BEST NEW R...39.pyc
windows11-21h2-x64
3BEST NEW R...39.pyc
windows11-21h2-x64
3BEST NEW R...39.pyc
windows11-21h2-x64
3BEST NEW R...Red.py
windows11-21h2-x64
3BEST NEW R...loo.py
windows11-21h2-x64
3BEST NEW R...ate.py
windows11-21h2-x64
3BEST NEW R...10.pyc
windows11-21h2-x64
3Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-08-2024 15:09
Behavioral task
behavioral1
Sample
BEST NEW RAID TOOL/RTB.py
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
BEST NEW RAID TOOL/RTBFiles/ServerSmasher/__pycache__/smconfig.cpython-310.pyc
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
BEST NEW RAID TOOL/RTBFiles/ServerSmasher/__pycache__/smconfig.cpython-39.pyc
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
BEST NEW RAID TOOL/RTBFiles/ServerSmasher/serversmasher.py
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
BEST NEW RAID TOOL/RTBFiles/ServerSmasher/serversmasherGUI.py
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
BEST NEW RAID TOOL/RTBFiles/ServerSmasher/smconfig.py
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
BEST NEW RAID TOOL/RTBFiles/__pycache__/attack_dict.cpython-310.pyc
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
BEST NEW RAID TOOL/RTBFiles/__pycache__/attack_dict.cpython-39.pyc
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
BEST NEW RAID TOOL/RTBFiles/attack_controller.py
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
BEST NEW RAID TOOL/RTBFiles/attack_dict.py
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
BEST NEW RAID TOOL/RTBFiles/cleanup.py
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
BEST NEW RAID TOOL/RTBFiles/extras/diagnose.py
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
BEST NEW RAID TOOL/RTBFiles/play.py
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
BEST NEW RAID TOOL/RTBFiles/player.py
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
BEST NEW RAID TOOL/RTBFiles/vcspam.py
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
BEST NEW RAID TOOL/RTBStealerBuilder/Nitro Sniper .py
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
BEST NEW RAID TOOL/geckodriver.exe
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
BEST NEW RAID TOOL/iamupdate1.exe
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
BEST NEW RAID TOOL/legacyplugins/Copypasta Spammer (Example Plugin)/copypastaspam.py
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
BEST NEW RAID TOOL/legacyplugins/Copypasta Spammer (Example Plugin)/main_copypasta.py
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
BEST NEW RAID TOOL/plugins/Additional/bulkgiftchecker.py
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
BEST NEW RAID TOOL/plugins/Additional/ghostpingmenu.py
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
BEST NEW RAID TOOL/plugins/Bulk Inventory Checker by DeadBread_rtbplugin.py
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
BEST NEW RAID TOOL/plugins/Ghost Ping By DeadBread (Example)_rtbplugin.py
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
BEST NEW RAID TOOL/plugins/__pycache__/Bulk Inventory Checker by DeadBread_rtbplugin.cpython-310.pyc
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
BEST NEW RAID TOOL/plugins/__pycache__/Bulk Inventory Checker by DeadBread_rtbplugin.cpython-39.pyc
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
BEST NEW RAID TOOL/plugins/__pycache__/Ghost Ping By DeadBread (Example)_rtbplugin.cpython-39.pyc
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
BEST NEW RAID TOOL/plugins/__pycache__/helper.cpython-39.pyc
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
BEST NEW RAID TOOL/themes/DeadRed.py
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
BEST NEW RAID TOOL/themes/Future Bloo.py
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
BEST NEW RAID TOOL/themes/Template.py
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
BEST NEW RAID TOOL/themes/__pycache__/DeadRed.cpython-310.pyc
Resource
win11-20240802-en
General
-
Target
BEST NEW RAID TOOL/iamupdate1.exe
-
Size
75KB
-
MD5
43326a9c0df39473916c94e38ebe0465
-
SHA1
9f7bfdc8ec9e02afe54f4a973d0d16122ed6e027
-
SHA256
2a223700ae3377c565cdfec3ba5e309e88d138d8371bb6aadad632f22dd88dc3
-
SHA512
7fa3800126ea2334fc55c92c82883c1d160a87163995d240f6da1ea5ba4f0e25549183af4da965647534bb186006c39e34d9578af614b1d5e22916fbb486ed9e
-
SSDEEP
1536:uBdK/BtATyQmRWpPKH+HZW/emPnIJwPUIVembD076qTNmJn:uBGtATrpPKH+HwrPI+DcmbDejJ8n
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral18/memory/332-1-0x0000000000790000-0x00000000007AA000-memory.dmp family_stormkitty -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Windows\CurrentVersion\Run\BlitzedGrabber = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BEST NEW RAID TOOL\\iamupdate1.exe" iamupdate1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 1 discord.com 6 discord.com 13 discord.com -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1040 netsh.exe 2924 cmd.exe 4204 netsh.exe 2260 cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 iamupdate1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString iamupdate1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 332 iamupdate1.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 332 wrote to memory of 2260 332 iamupdate1.exe 84 PID 332 wrote to memory of 2260 332 iamupdate1.exe 84 PID 2260 wrote to memory of 1472 2260 cmd.exe 86 PID 2260 wrote to memory of 1472 2260 cmd.exe 86 PID 2260 wrote to memory of 1040 2260 cmd.exe 87 PID 2260 wrote to memory of 1040 2260 cmd.exe 87 PID 2260 wrote to memory of 3748 2260 cmd.exe 88 PID 2260 wrote to memory of 3748 2260 cmd.exe 88 PID 332 wrote to memory of 2924 332 iamupdate1.exe 89 PID 332 wrote to memory of 2924 332 iamupdate1.exe 89 PID 2924 wrote to memory of 4420 2924 cmd.exe 91 PID 2924 wrote to memory of 4420 2924 cmd.exe 91 PID 2924 wrote to memory of 4204 2924 cmd.exe 92 PID 2924 wrote to memory of 4204 2924 cmd.exe 92 PID 2924 wrote to memory of 2076 2924 cmd.exe 93 PID 2924 wrote to memory of 2076 2924 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\BEST NEW RAID TOOL\iamupdate1.exe"C:\Users\Admin\AppData\Local\Temp\BEST NEW RAID TOOL\iamupdate1.exe"1⤵
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1472
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1040
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:3748
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name=65001 key=clear | findstr Key2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4420
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile name=65001 key=clear3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4204
-
-
C:\Windows\system32\findstr.exefindstr Key3⤵PID:2076
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1