General
-
Target
stinger64.exe
-
Size
46.8MB
-
Sample
241111-kcemwsvrew
-
MD5
8b2e581985d25d62f445e35272b0166c
-
SHA1
b9da986997c504d41dbcb2ba092950fb85d8c423
-
SHA256
c30ffcd56304c8c37f3a909b8763bf0bac7ee171cf5d9b72bc16a904d3273271
-
SHA512
5951c6714f38444fc3f15a351ffda226f9310282bda15cdc732774e0ea4c217438427cd3beba4fa30cb6dbc741b62377d0806748be7d4a9dd084607d2d46d34c
-
SSDEEP
786432:yKNN8m/oiShrwFxCU+C5bUWUxEb140g1uwANq03j6QGBMiM5zPJeX57+8DUFJyft:pNaco5JKxCVCtUWX11QuDqMGQ4sJ27+a
Static task
static1
Behavioral task
behavioral1
Sample
stinger64.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
stinger64.exe
-
Size
46.8MB
-
MD5
8b2e581985d25d62f445e35272b0166c
-
SHA1
b9da986997c504d41dbcb2ba092950fb85d8c423
-
SHA256
c30ffcd56304c8c37f3a909b8763bf0bac7ee171cf5d9b72bc16a904d3273271
-
SHA512
5951c6714f38444fc3f15a351ffda226f9310282bda15cdc732774e0ea4c217438427cd3beba4fa30cb6dbc741b62377d0806748be7d4a9dd084607d2d46d34c
-
SSDEEP
786432:yKNN8m/oiShrwFxCU+C5bUWUxEb140g1uwANq03j6QGBMiM5zPJeX57+8DUFJyft:pNaco5JKxCVCtUWX11QuDqMGQ4sJ27+a
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Zloader family
-
Creates new service(s)
-
Drops file in Drivers directory
-
A potential corporate email address has been identified in the URL: 0FD024EB6135CAAB0A495CAF@AdobeOrg
-
Impair Defenses: Safe Mode Boot
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1