General
-
Target
KametaGame.rar
-
Size
73.8MB
-
Sample
241112-jb8znsxgqp
-
MD5
33ba76588509e5781f6956aafe7599c6
-
SHA1
a06e53afc79cc79a2e45c3964286ffea83628403
-
SHA256
7410df3bf88e63503d20b65415fcbca83893ab9d320e33abde333ae0ae6accd3
-
SHA512
920261b97bd4aeab225817ddd2b147b0b1a44885602f1ce4510098ed2d0a888553fd76637743ef1ce279ee85d9971a98c0d0e01862db9d996a5613b9cd96772f
-
SSDEEP
1572864:ejawPf5MWjCLmhYT+H0pw0CDQWvoR7tQiYNaXqsOG8jLmn:eNqBmNUCaNtPYUX7X8jLa
Static task
static1
Behavioral task
behavioral1
Sample
KametaGame.rar
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
KametaGame.rar
-
Size
73.8MB
-
MD5
33ba76588509e5781f6956aafe7599c6
-
SHA1
a06e53afc79cc79a2e45c3964286ffea83628403
-
SHA256
7410df3bf88e63503d20b65415fcbca83893ab9d320e33abde333ae0ae6accd3
-
SHA512
920261b97bd4aeab225817ddd2b147b0b1a44885602f1ce4510098ed2d0a888553fd76637743ef1ce279ee85d9971a98c0d0e01862db9d996a5613b9cd96772f
-
SSDEEP
1572864:ejawPf5MWjCLmhYT+H0pw0CDQWvoR7tQiYNaXqsOG8jLmn:eNqBmNUCaNtPYUX7X8jLa
Score10/10-
Hexon family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1