Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 02:46
Behavioral task
behavioral1
Sample
Discord-Raid-Tool-Box-main/PussyKiller.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Discord-Raid-Tool-Box-main/PussyKiller.exe
Resource
win10v2004-20240802-en
General
-
Target
Discord-Raid-Tool-Box-main/PussyKiller.exe
-
Size
74KB
-
MD5
7acd7ca811c678a92d62d556cae858dc
-
SHA1
b05d0fd47d2d905234db53614f725e3744c93b3e
-
SHA256
736f8b467d09e4805d336c56b49ec183355dc433e04b93904d2e8d5876d5b9de
-
SHA512
24fe70950fc092d9de383f5c80c70bdc4bd5e342b927e2fb495752e0036c3d2eb0547f60467ef5019a686fffd2f8057105d13dd566172f9438ffe4434748166b
-
SSDEEP
1536:rNtW7bvrmSbUMiuidaw6v3ZfXR6/A8Id0FWGV09auvIUxjFxtbm:rzTyXRKA8Iwg9auvIUhFxty
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/2996-1-0x0000000000900000-0x0000000000918000-memory.dmp disable_win_def -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2996-1-0x0000000000900000-0x0000000000918000-memory.dmp family_stormkitty -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
PussyKiller.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\nvidiaDValueOn = "C:\\Users\\Admin\\AppData\\Local\\NVIDIA Local Drivers\\DriversUpdateProcess_x64.exe" PussyKiller.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PussyKiller.exedescription pid process Token: SeDebugPrivilege 2996 PussyKiller.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
PussyKiller.exedescription pid process target process PID 2996 wrote to memory of 1324 2996 PussyKiller.exe WerFault.exe PID 2996 wrote to memory of 1324 2996 PussyKiller.exe WerFault.exe PID 2996 wrote to memory of 1324 2996 PussyKiller.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Discord-Raid-Tool-Box-main\PussyKiller.exe"C:\Users\Admin\AppData\Local\Temp\Discord-Raid-Tool-Box-main\PussyKiller.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2996 -s 10082⤵PID:1324
-