General
-
Target
add.exe
-
Size
41KB
-
Sample
241017-bref1avame
-
MD5
b7afde8a62a07ff296a2710fe4b1dfd3
-
SHA1
3f2a96a00029470a784a0ef2682c46ebbe7326d1
-
SHA256
5fc540445527a02af8d14becec39d3b7283c2cb24ef4f547cab7aeb2ce5193ef
-
SHA512
9dff009e74c2352b34159fc9bf8252c5508eb9a5fd4b1a298f4b179fc08e1a9327dd9c8acd67bc8e8ef4c0b0cd9cb00b2ad3f1eb670971ea16cefc721558dc0c
-
SSDEEP
768:dk0KOhPmqwA4DmRsHoxfv9lJ0z1QB6SNEHvro25E:dqA4DmaSv941Qo0EH025E
Static task
static1
Behavioral task
behavioral1
Sample
add.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
add.exe
-
Size
41KB
-
MD5
b7afde8a62a07ff296a2710fe4b1dfd3
-
SHA1
3f2a96a00029470a784a0ef2682c46ebbe7326d1
-
SHA256
5fc540445527a02af8d14becec39d3b7283c2cb24ef4f547cab7aeb2ce5193ef
-
SHA512
9dff009e74c2352b34159fc9bf8252c5508eb9a5fd4b1a298f4b179fc08e1a9327dd9c8acd67bc8e8ef4c0b0cd9cb00b2ad3f1eb670971ea16cefc721558dc0c
-
SSDEEP
768:dk0KOhPmqwA4DmRsHoxfv9lJ0z1QB6SNEHvro25E:dqA4DmaSv941Qo0EH025E
-
StormKitty payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1