General
-
Target
tester.exe
-
Size
45KB
-
Sample
240922-epjvgs1dmq
-
MD5
307f44b3aa4b6b84570d609aad9bed2d
-
SHA1
85530a7da34e63db54027b5c632a59eb926cfab9
-
SHA256
1778b2a4eedd366d7f71bb5a2e2a6cd8dbf0691f291efc3020dd13cc9d1ab393
-
SHA512
0bbce563f1d74eb28c239ff4e972309362f8b385312162d7896eead21fd0d2426ddda84c8539ee951bcb1953613e16a197e89ff574542c51da6aac2e35ef9e6a
-
SSDEEP
768:HbUAM7L77H9Xxz0Qk97RHrnS9RULQ89PKfn1z1QB6S6pQvrM/bU:HbUAM7LPLzjIRr6Gs89W1QoFpQo/bU
Static task
static1
Behavioral task
behavioral1
Sample
tester.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
tester.exe
-
Size
45KB
-
MD5
307f44b3aa4b6b84570d609aad9bed2d
-
SHA1
85530a7da34e63db54027b5c632a59eb926cfab9
-
SHA256
1778b2a4eedd366d7f71bb5a2e2a6cd8dbf0691f291efc3020dd13cc9d1ab393
-
SHA512
0bbce563f1d74eb28c239ff4e972309362f8b385312162d7896eead21fd0d2426ddda84c8539ee951bcb1953613e16a197e89ff574542c51da6aac2e35ef9e6a
-
SSDEEP
768:HbUAM7L77H9Xxz0Qk97RHrnS9RULQ89PKfn1z1QB6S6pQvrM/bU:HbUAM7LPLzjIRr6Gs89W1QoFpQo/bU
-
Modifies visibility of file extensions in Explorer
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
3Hidden Files and Directories
3Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1