General
-
Target
file.exe
-
Size
2.2MB
-
Sample
241208-st6rpsxmct
-
MD5
1d3f1b333a438438193b1d29731fd607
-
SHA1
0c8852028d925fc940ad1fcccc7539bf3c0db92c
-
SHA256
ad822394ecd393272d3d1ba77306e502ee90259f4c328dab80e9d6b5e4bd363f
-
SHA512
b9008ef7fc8aadc92fe20df3d3081a06bc561491b3aaac35caaf256f136e8c95c248d1622112ef08cc415f0b6efe10055b4cc31d9b1f88b508c64b688e8f561d
-
SSDEEP
49152:C3YMeBr/pNfVrjepcpNHrMS0p1K4Gsu08+nzgc:IeBr/pNfVvepwaR
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
2.2MB
-
MD5
1d3f1b333a438438193b1d29731fd607
-
SHA1
0c8852028d925fc940ad1fcccc7539bf3c0db92c
-
SHA256
ad822394ecd393272d3d1ba77306e502ee90259f4c328dab80e9d6b5e4bd363f
-
SHA512
b9008ef7fc8aadc92fe20df3d3081a06bc561491b3aaac35caaf256f136e8c95c248d1622112ef08cc415f0b6efe10055b4cc31d9b1f88b508c64b688e8f561d
-
SSDEEP
49152:C3YMeBr/pNfVrjepcpNHrMS0p1K4Gsu08+nzgc:IeBr/pNfVvepwaR
Score10/10-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-