General
-
Target
SilverClient.exe
-
Size
37KB
-
Sample
250214-swh4esspaw
-
MD5
776fac12ea695a8f220fc086ac25be69
-
SHA1
dd90c8b3f18da5c7791a0a1d023fc829e8e6fc71
-
SHA256
4d42a51d71daae6e4fcf09e5030cce2f9d220a0d4106fca7e0bee974b0fbff0c
-
SHA512
d6c468d337013025106913092a3c1863acdcdcd1811e5caf6327ab06538cbbf193f1354e836e41495a0dcbc1fd049478765bfdfb39ecb586750452e7dacd7b73
-
SSDEEP
768:z98X+6AlPNHIcSHLgBaRJGw9I9YB6SPMTtvsGvJE:x8Xhj5j93ofTtUGvJE
Static task
static1
Behavioral task
behavioral1
Sample
SilverClient.exe
Resource
win10ltsc2021-20250211-en
Malware Config
Targets
-
-
Target
SilverClient.exe
-
Size
37KB
-
MD5
776fac12ea695a8f220fc086ac25be69
-
SHA1
dd90c8b3f18da5c7791a0a1d023fc829e8e6fc71
-
SHA256
4d42a51d71daae6e4fcf09e5030cce2f9d220a0d4106fca7e0bee974b0fbff0c
-
SHA512
d6c468d337013025106913092a3c1863acdcdcd1811e5caf6327ab06538cbbf193f1354e836e41495a0dcbc1fd049478765bfdfb39ecb586750452e7dacd7b73
-
SSDEEP
768:z98X+6AlPNHIcSHLgBaRJGw9I9YB6SPMTtvsGvJE:x8Xhj5j93ofTtUGvJE
Score10/10-
StormKitty payload
-
Stormkitty family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-