General
-
Target
SpyroidRatv8.5OriginalCracked.exe
-
Size
55.7MB
-
Sample
241215-v4fz5s1mct
-
MD5
f2a9d485cc841bbd44543973e3739c05
-
SHA1
53235a653bfc5822693e9adfdea01e1164909df9
-
SHA256
37fae2ac78281be79821e625ba969bcd0c11336c56e68b71b5fbb284e9f8fd60
-
SHA512
4de26d0f38868934182e0ef1fc3270990a66eba2c6af340490f55e4bf7f04696f91f93f62457191031d468e34c0ec5f0ba4995df63275dbf77254b1a7d2be56d
-
SSDEEP
786432:JrXC9Vqv1tRgvtgkG8iAl0dYyBGpjKElxsdo/AG9Lqxlwy+WpL15Q7HxJ1KP3u5C:JjC9VvtdG8iV6jKmqdo/ry+gXwIuqxZ
Static task
static1
Behavioral task
behavioral1
Sample
SpyroidRatv8.5OriginalCracked.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SpyroidRatv8.5OriginalCracked.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
SpyroidRatv8.5OriginalCracked.exe
-
Size
55.7MB
-
MD5
f2a9d485cc841bbd44543973e3739c05
-
SHA1
53235a653bfc5822693e9adfdea01e1164909df9
-
SHA256
37fae2ac78281be79821e625ba969bcd0c11336c56e68b71b5fbb284e9f8fd60
-
SHA512
4de26d0f38868934182e0ef1fc3270990a66eba2c6af340490f55e4bf7f04696f91f93f62457191031d468e34c0ec5f0ba4995df63275dbf77254b1a7d2be56d
-
SSDEEP
786432:JrXC9Vqv1tRgvtgkG8iAl0dYyBGpjKElxsdo/AG9Lqxlwy+WpL15Q7HxJ1KP3u5C:JjC9VvtdG8iV6jKmqdo/ry+gXwIuqxZ
-
StormKitty payload
-
Stormkitty family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2