General

  • Target

    iviewers.dll

  • Size

    88KB

  • Sample

    250102-wwhz7szrev

  • MD5

    33ae2b9c3e710254fe2e2ce35ff8a7c8

  • SHA1

    109e32187254b27e04ef18bbe1b48fad42bca841

  • SHA256

    9c2838e120c7ed5b582bedc6177f14a52aa578adeea269d0f96fc71a95bd6e68

  • SHA512

    2abe017e2f1d29fe789206d6483b9b33e7abd0871300d678eaba15e390d55c5e197d6cea6ea32dfdee5f65d082574adcc192a4fc0c9506bbba8ad7e957e12599

  • SSDEEP

    1536:L02ifPleVQ8zxlaSRslYzy26igsbuNdn4fuH1e6tsWy4cdlETcgS/iG:5iV4Qaxltsl/ggsCN3oBlQcgkiG

Malware Config

Targets

    • Target

      iviewers.dll

    • Size

      88KB

    • MD5

      33ae2b9c3e710254fe2e2ce35ff8a7c8

    • SHA1

      109e32187254b27e04ef18bbe1b48fad42bca841

    • SHA256

      9c2838e120c7ed5b582bedc6177f14a52aa578adeea269d0f96fc71a95bd6e68

    • SHA512

      2abe017e2f1d29fe789206d6483b9b33e7abd0871300d678eaba15e390d55c5e197d6cea6ea32dfdee5f65d082574adcc192a4fc0c9506bbba8ad7e957e12599

    • SSDEEP

      1536:L02ifPleVQ8zxlaSRslYzy26igsbuNdn4fuH1e6tsWy4cdlETcgS/iG:5iV4Qaxltsl/ggsCN3oBlQcgkiG

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks