General
-
Target
SilverClient.exe
-
Size
42KB
-
Sample
240905-bk1qna1dnc
-
MD5
e32cc14226ce47c9342ed347c7a47438
-
SHA1
a8ec8484eebdd76d38988007a21afe56cbeaf951
-
SHA256
59dd74a25d62b758529d2a9bfd5fefde30077b26249116ceffd01ce16b2688fa
-
SHA512
b164661ca40c386843b00cbeff8a86157a23f0e4c5e539fe596fad8786a1752ef50eaa65590a65ae1ca6512e720e3501fece61381b921f55e3ec4855f91bfc63
-
SSDEEP
768:MiIsJJcPlV1csUxJRBN/l+cJn6590BcmSHrlruPXr7yaaxLEt0URohRULL9S+1fr:MiIsDctUBbn659XTkt0UQGf9Zr1QoE9W
Static task
static1
Behavioral task
behavioral1
Sample
SilverClient.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
SilverClient.exe
-
Size
42KB
-
MD5
e32cc14226ce47c9342ed347c7a47438
-
SHA1
a8ec8484eebdd76d38988007a21afe56cbeaf951
-
SHA256
59dd74a25d62b758529d2a9bfd5fefde30077b26249116ceffd01ce16b2688fa
-
SHA512
b164661ca40c386843b00cbeff8a86157a23f0e4c5e539fe596fad8786a1752ef50eaa65590a65ae1ca6512e720e3501fece61381b921f55e3ec4855f91bfc63
-
SSDEEP
768:MiIsJJcPlV1csUxJRBN/l+cJn6590BcmSHrlruPXr7yaaxLEt0URohRULL9S+1fr:MiIsDctUBbn659XTkt0UQGf9Zr1QoE9W
Score10/10-
StormKitty payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1