General
-
Target
2024-10-30_b710318c9e53a913b0980d712f545dce_avoslocker_hijackloader
-
Size
3.5MB
-
Sample
241030-z27gjazndt
-
MD5
b710318c9e53a913b0980d712f545dce
-
SHA1
35a7fa3ce975e9523db30e0fa336f26df44dd595
-
SHA256
bbbe89f639a538b804eefebffac0659d5879938423280baa10bf989a533f34e3
-
SHA512
a43ac36654ef09ea1078a1caaf9fe354cf48b38aac52ff28b170fa197018bcae83471125a143b7689c0fbdca7c08a701f07478c13de58adcf5df3ffc502b6da3
-
SSDEEP
98304:5AyJqL5ceKpuULlMr/vOU/jIEeQfoR/IuOFVjUu5:5AyJHy1FIF0wu
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-30_b710318c9e53a913b0980d712f545dce_avoslocker_hijackloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-30_b710318c9e53a913b0980d712f545dce_avoslocker_hijackloader.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-10-30_b710318c9e53a913b0980d712f545dce_avoslocker_hijackloader
-
Size
3.5MB
-
MD5
b710318c9e53a913b0980d712f545dce
-
SHA1
35a7fa3ce975e9523db30e0fa336f26df44dd595
-
SHA256
bbbe89f639a538b804eefebffac0659d5879938423280baa10bf989a533f34e3
-
SHA512
a43ac36654ef09ea1078a1caaf9fe354cf48b38aac52ff28b170fa197018bcae83471125a143b7689c0fbdca7c08a701f07478c13de58adcf5df3ffc502b6da3
-
SSDEEP
98304:5AyJqL5ceKpuULlMr/vOU/jIEeQfoR/IuOFVjUu5:5AyJHy1FIF0wu
-
StormKitty payload
-
Stormkitty family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2