Analysis

  • max time kernel
    91s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2025 16:58

General

  • Target

    Armageddon Stealer 1.0 by Krusty/mstscax.dll

  • Size

    7.6MB

  • MD5

    f988af5ce1a34ad0f4b66492aa1526c5

  • SHA1

    c8bd1ea389b50c4f5fe78164d3ea51ff5eb54a3b

  • SHA256

    cac0cfe8c203c6ce5010a981bf027a71dc47167d632546dcf60bd82bc181c80d

  • SHA512

    bd2f2cd977775b0aae4a7740ed23b4c2612d6d23b592ff267021605fc7a6b1db9062122dade8b070bc0917af14c71f3065eabc980cfbe8a8ddaa1b8feac7e4de

  • SSDEEP

    196608:C+shPWaOzbHoMvPBGT7pwNS45sU07CSmYPB2Yruy01KbzSSaL+hXL66M8R4yhWEQ:C+shP1OzbHoMvPBGnpwNS45sTCSmYPBo

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 48 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\Armageddon Stealer 1.0 by Krusty\mstscax.dll"
    1⤵
    • Modifies registry class
    PID:844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads