General
-
Target
ad50fbeb07b058ac473e89fb7b0c972ce6579e3927d3142cc43418f82ef5410f.zip
-
Size
205KB
-
Sample
241001-tkvthssckb
-
MD5
6d45b3dadb4d2da56dd5208d2beee397
-
SHA1
e0ad9a5b51ff3bcf64949bb1c153a6ad8c819db4
-
SHA256
a6c79c4ba510f8263cf18195e3b20537b820a316ea3eb3bf8f8fab2f2b27b84c
-
SHA512
8dbd6a267ee9cfc30475d679fdf80294529cda1f79cd017a4f753fa0fc7f7b716d58d37f1b6de1fd2983a7a1254302331e9fc60d468da3b414549aacff9c3e01
-
SSDEEP
6144:83gLaAYQ8K2pfCFL+uMntO6l+S4qxiumiYOsads:8QLjh2pGctb+ExiumuW
Static task
static1
Behavioral task
behavioral1
Sample
ad50fbeb07b058ac473e89fb7b0c972ce6579e3927d3142cc43418f82ef5410f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad50fbeb07b058ac473e89fb7b0c972ce6579e3927d3142cc43418f82ef5410f.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ad50fbeb07b058ac473e89fb7b0c972ce6579e3927d3142cc43418f82ef5410f
-
Size
263KB
-
MD5
5c8af2740a5828f8280b7e5cd4a2d851
-
SHA1
77c382783298daa74ce37c09ef56bdd3d67bb795
-
SHA256
ad50fbeb07b058ac473e89fb7b0c972ce6579e3927d3142cc43418f82ef5410f
-
SHA512
d6e79b3ba49dadadbfd32f281e4e61a35ba283f805b3457f5d54026cf6fe91bad11d5b0e1ef3d27fa5921bb92920072bf0aa7fbd7042fdf2ea6e3ee9f1dc6202
-
SSDEEP
6144:ZDKW1Lgbdl0TBBvjc/1yeZNJfyUg5aXoFtKGzchQrvILv+:Jh1Lk70TnvjcNy2yUg5aXGwGYQrva+
-
StormKitty payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1