General
-
Target
SilverClient.exe
-
Size
33KB
-
Sample
250206-vyw46s1pay
-
MD5
5675594ba9110a749bdd1bf9d2cf4252
-
SHA1
2fc803ba59555b3f58bb1be8e4eac4bdd291c472
-
SHA256
cb94a8e6572ceb8cb0e6649a1956390521f19d5642f7693187d364fba23735b4
-
SHA512
975ce3d094de70a8b4fa59b557ed3229e5d04d6fe21c2206451b8a91cccbd33748b1159e50e9e9332240897ea2f0a75f6c320e81a6c0c686de5b93e5e22a317b
-
SSDEEP
768:t0tAjVc38hoGxfV9g9LnvR10z1QB6SjME:vf99g9LnvI1QowME
Static task
static1
Behavioral task
behavioral1
Sample
SilverClient.exe
Resource
win10ltsc2021-20250128-en
Malware Config
Targets
-
-
Target
SilverClient.exe
-
Size
33KB
-
MD5
5675594ba9110a749bdd1bf9d2cf4252
-
SHA1
2fc803ba59555b3f58bb1be8e4eac4bdd291c472
-
SHA256
cb94a8e6572ceb8cb0e6649a1956390521f19d5642f7693187d364fba23735b4
-
SHA512
975ce3d094de70a8b4fa59b557ed3229e5d04d6fe21c2206451b8a91cccbd33748b1159e50e9e9332240897ea2f0a75f6c320e81a6c0c686de5b93e5e22a317b
-
SSDEEP
768:t0tAjVc38hoGxfV9g9LnvR10z1QB6SjME:vf99g9LnvI1QowME
-
StormKitty payload
-
Stormkitty family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-