General
-
Target
7623799dc5b101e55edb08459ff09232d41579776b1110ae119c52580ed09c41N.exe
-
Size
3.2MB
-
Sample
241222-g6t3wsxldz
-
MD5
2fcda8a0696d0cb8735e8243524ab110
-
SHA1
4c1ef9e0ab4bc7fd4fb673b6af627830b0a8f9c4
-
SHA256
7623799dc5b101e55edb08459ff09232d41579776b1110ae119c52580ed09c41
-
SHA512
a76c2bb7e1831f0e29fca56f979f786437021f64d874c9d9294be9e87860c9edaf4cd59e47130411783ea364c5c7fa5655266dc11f5e13a5d23d245d7b5525cd
-
SSDEEP
98304:kKaLGKadqrcJJbruZjqdJ9SSFXO0UDae0AXkv5Iw5dI:ELK+ROqSFe0fAXE5Iw5i
Static task
static1
Behavioral task
behavioral1
Sample
7623799dc5b101e55edb08459ff09232d41579776b1110ae119c52580ed09c41N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
7623799dc5b101e55edb08459ff09232d41579776b1110ae119c52580ed09c41N.exe
-
Size
3.2MB
-
MD5
2fcda8a0696d0cb8735e8243524ab110
-
SHA1
4c1ef9e0ab4bc7fd4fb673b6af627830b0a8f9c4
-
SHA256
7623799dc5b101e55edb08459ff09232d41579776b1110ae119c52580ed09c41
-
SHA512
a76c2bb7e1831f0e29fca56f979f786437021f64d874c9d9294be9e87860c9edaf4cd59e47130411783ea364c5c7fa5655266dc11f5e13a5d23d245d7b5525cd
-
SSDEEP
98304:kKaLGKadqrcJJbruZjqdJ9SSFXO0UDae0AXkv5Iw5dI:ELK+ROqSFe0fAXE5Iw5i
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Venomrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-