Overview
overview
10Static
static
10skystealer...ain.py
windows7-x64
3skystealer...ain.py
windows10-2004-x64
3skystealer...ild.py
windows7-x64
3skystealer...ild.py
windows10-2004-x64
3skystealer...fig.py
windows7-x64
3skystealer...fig.py
windows10-2004-x64
3skystealer...env.py
windows7-x64
3skystealer...env.py
windows10-2004-x64
3skystealer...ate.py
windows7-x64
3skystealer...ate.py
windows10-2004-x64
3skystealer...fig.py
windows7-x64
3skystealer...fig.py
windows10-2004-x64
3skystealer...in.exe
windows7-x64
7skystealer...in.exe
windows10-2004-x64
7skystealer...bug.py
windows7-x64
3skystealer...bug.py
windows10-2004-x64
3skystealer...ken.py
windows7-x64
3skystealer...ken.py
windows10-2004-x64
3skystealer...ion.py
windows7-x64
3skystealer...ion.py
windows10-2004-x64
3skystealer...tup.py
windows7-x64
3skystealer...tup.py
windows10-2004-x64
3skystealer...nfo.py
windows7-x64
3skystealer...nfo.py
windows10-2004-x64
3skystealer...fig.py
windows7-x64
3skystealer...fig.py
windows10-2004-x64
3skystealer...ain.py
windows7-x64
3skystealer...ain.py
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 01:27
Behavioral task
behavioral1
Sample
skystealer-main/builder/main.py
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
skystealer-main/builder/main.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
skystealer-main/builder/util/build.py
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
skystealer-main/builder/util/build.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
skystealer-main/builder/util/config.py
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
skystealer-main/builder/util/config.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
skystealer-main/builder/util/makeenv.py
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
skystealer-main/builder/util/makeenv.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
skystealer-main/builder/util/obfuscate.py
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
skystealer-main/builder/util/obfuscate.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
skystealer-main/builder/util/writeconfig.py
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
skystealer-main/builder/util/writeconfig.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
skystealer-main/main.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
skystealer-main/main.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
skystealer-main/src/components/antidebug.py
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
skystealer-main/src/components/antidebug.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
skystealer-main/src/components/discordtoken.py
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
skystealer-main/src/components/discordtoken.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
skystealer-main/src/components/injection.py
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
skystealer-main/src/components/injection.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
skystealer-main/src/components/startup.py
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
skystealer-main/src/components/startup.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
skystealer-main/src/components/systeminfo.py
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
skystealer-main/src/components/systeminfo.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
skystealer-main/src/config.py
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
skystealer-main/src/config.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
skystealer-main/src/main.py
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
skystealer-main/src/main.py
Resource
win10v2004-20241007-en
General
-
Target
skystealer-main/builder/util/writeconfig.py
-
Size
555B
-
MD5
2b14c9284e5337eb2af6359827b523e9
-
SHA1
74f35cae83f8830c181240d945c94c162160c331
-
SHA256
eb1007f66f1c665f2a05156e78df47b7386736c9cdc272dbcc114ab3291029f7
-
SHA512
264399eb65d810e47bdd85a4cea943ab06937f44cf6510b71f4202cc745d49b3087b369a64d34e9db5e16365defbfd8a45336b0fbd0dba1d3e1972093be94dec
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2860 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2860 AcroRd32.exe 2860 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 388 wrote to memory of 2252 388 cmd.exe 32 PID 388 wrote to memory of 2252 388 cmd.exe 32 PID 388 wrote to memory of 2252 388 cmd.exe 32 PID 2252 wrote to memory of 2860 2252 rundll32.exe 33 PID 2252 wrote to memory of 2860 2252 rundll32.exe 33 PID 2252 wrote to memory of 2860 2252 rundll32.exe 33 PID 2252 wrote to memory of 2860 2252 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\skystealer-main\builder\util\writeconfig.py1⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\skystealer-main\builder\util\writeconfig.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\skystealer-main\builder\util\writeconfig.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e8f3735c02d0d63d4cec0de30fb32137
SHA1e041b0637917e35fbfc34f156de3b641c41ceb73
SHA256f45d2ac9af43b280f0ac946616ae22fa526fc965b4000407213225a1a9a46a0f
SHA5128ab61852a52a8e3ed1008f8a37a799427407a91d552df3e2e97942ddc60b31e04e910159bb3999f9114f41d2c10a6c29fb549dcfbf0f0ef899279aad2d7f7fae