General

  • Target

    stane.exe.zip

  • Size

    21KB

  • Sample

    250316-w17jcswzhv

  • MD5

    70c0561de8deafce75edc44249c84e74

  • SHA1

    8ff2eea9930bbd7083b0be313f8db86406596aee

  • SHA256

    0bd5db256d6851fc62f6852d8b5a2b337552cb18f176b175ed6ee0d0e3ef71f0

  • SHA512

    029d3a40630c87058190c85cb6dbd9a607b1eb0df9305384cbf5f03fc0e883f2dfe03ce42c36284814cb825da0b866ffdcd577bdb2ca841f7037afa04e668721

  • SSDEEP

    384:o+3YVTZgR1TIDGyIMsk61ffCJl8DgmF6YLUKpZaH7IO/MP/cB916IU1TRsGtW/bB:d5KGyI3k6dC8F6Y9enecBVU1TREbh+CV

Malware Config

Extracted

Family

silverrat

Version

1.0.0.0

C2

127.0.0.1:7777

Mutex

SilverMutex_rRFGGPWbDL

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • discord

    https://discord.com/api/webhooks/1347588263912931471/4fuOJGBeWfPxS355n2A3rAvoaJIHu2buEs4u328VgX04b1AG-Wms_voyFPh7UbKvQmaN

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    VUR3VFRDaUFnUE9PUmJsdlJXVEFlVkdSSEVsU1JB

  • payload_url

    https://g.top4top.io/p_2522c7w8u1.png

  • reconnect_delay

    4

  • server_signature

    mIWjY39YvyRFwG1XZGVxxKySfiqo9jIBlzxO1MhSf1TjN1I9Xf5iZEL+RLH1J/3dc19LIfEiHuMF0ihOLQnWtAlPIXoR+kADAYPRBbzuTZbmHx80OEgv1dpMN/0E32tMgqPMJ8uJji+Ec4Y9mJ+7M6ohZTtrJZcwx/hlCsSRwU6YbTxixfFtKSgyh2oESMavMQkUm2mFdkpK6DDDuKxS3Fr3r9yPWg2iRTYf7Nk5WUCwYXrRq1Bzi2ZsjWK+wsjKupY1rnYJl8QyfTX718R/3SiXPCoYPloTqUgGSq0+HiL26WAhC3+cOiGHzOYamkLDn4D3IBW983eN9LAXsIbED1pjqd1F+my+5U4Hk+0hmNDYqQV1nlNPtHk2pmdYgAuO2897XAczSfzN8hfHoqUNXWcxCrtcQx7pcIQD9UmUPocBbmQWcUOIt3dvPBH7y7/3mpHigpUuaW4XDYb9jVhAFGxtjO7M+x5WJaX4Sd0hFmmMGxzGD8owDzTEawh1p5YaJ4rNEHL532v3SSjkVHf9BhkqWhs0R49dhx1voclCmpBsS5oOTvsWssk9JjMHyWon7u+tE+xBcL24KBpXVniD5NeWUjfonki3IrIEyV9JpQ612SFChzvK5O8WVkgRuJR0lhj0Rw772sMjC6FsWenq2XEREmQBTMdOh2XEas7oxlE=

Targets

    • Target

      stane.exe.bin

    • Size

      42KB

    • MD5

      f6a1256df7865af7d271a8c0d45162a3

    • SHA1

      95d2404a0ca38581b3a961b97c5635d4f5374202

    • SHA256

      23966b7119be128117b4e17ed6c1e0f1861a9913497a8eed288aa09367dc8da5

    • SHA512

      8f213f342a1f8da089732191893895b1d27b3157a386052ffa8993b02a5ff1d015248576a7c04259b0b06b534340c1bfc9f104ffdb8bc25501f5d607ce17befa

    • SSDEEP

      768:jT2KIg20zc8+3KXQvBRkttVu3hmyhxmzRUE98vDB6S4oMv+a7AA:jT2KI36NnPVmhmqxmzGE9YoXoMWa7AA

    • SilverRat

      SilverRat is trojan written in C#.

    • Silverrat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.