General
-
Target
33ae2b9c3e710254fe2e2ce35ff8a7c8.bin
-
Size
49KB
-
Sample
250104-bhcwtasrbx
-
MD5
62eaea03ee629b6564510a8ed3b93e5d
-
SHA1
417c541f22633cea6c104716d270baa3f1a89d4a
-
SHA256
8a1b3e2cd6e7eeebf0154db95342287a17334200fd71249e5daed74becc344b3
-
SHA512
442dc6a5ba12a178f9c65f0c94335a633fe71203f26c26c5a4cf05d86c0aa50ddde05fff61d8a72e2f7548901e66b3081c46661b2d95135a670457d32245db31
-
SSDEEP
1536:rMn6YZ5xEewlXh5r54xKs/SsIJvL6aENz60mCL7t:uv/8IYsSv2VNVJ
Static task
static1
Behavioral task
behavioral1
Sample
9c2838e120c7ed5b582bedc6177f14a52aa578adeea269d0f96fc71a95bd6e68.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
9c2838e120c7ed5b582bedc6177f14a52aa578adeea269d0f96fc71a95bd6e68.dll
-
Size
88KB
-
MD5
33ae2b9c3e710254fe2e2ce35ff8a7c8
-
SHA1
109e32187254b27e04ef18bbe1b48fad42bca841
-
SHA256
9c2838e120c7ed5b582bedc6177f14a52aa578adeea269d0f96fc71a95bd6e68
-
SHA512
2abe017e2f1d29fe789206d6483b9b33e7abd0871300d678eaba15e390d55c5e197d6cea6ea32dfdee5f65d082574adcc192a4fc0c9506bbba8ad7e957e12599
-
SSDEEP
1536:L02ifPleVQ8zxlaSRslYzy26igsbuNdn4fuH1e6tsWy4cdlETcgS/iG:5iV4Qaxltsl/ggsCN3oBlQcgkiG
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-