General

  • Target

    stane.exe.zip

  • Size

    21KB

  • Sample

    250316-wxrczawzds

  • MD5

    70c0561de8deafce75edc44249c84e74

  • SHA1

    8ff2eea9930bbd7083b0be313f8db86406596aee

  • SHA256

    0bd5db256d6851fc62f6852d8b5a2b337552cb18f176b175ed6ee0d0e3ef71f0

  • SHA512

    029d3a40630c87058190c85cb6dbd9a607b1eb0df9305384cbf5f03fc0e883f2dfe03ce42c36284814cb825da0b866ffdcd577bdb2ca841f7037afa04e668721

  • SSDEEP

    384:o+3YVTZgR1TIDGyIMsk61ffCJl8DgmF6YLUKpZaH7IO/MP/cB916IU1TRsGtW/bB:d5KGyI3k6dC8F6Y9enecBVU1TREbh+CV

Malware Config

Extracted

Family

silverrat

Version

1.0.0.0

C2

127.0.0.1:7777

Mutex

SilverMutex_rRFGGPWbDL

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • discord

    https://discord.com/api/webhooks/1347588263912931471/4fuOJGBeWfPxS355n2A3rAvoaJIHu2buEs4u328VgX04b1AG-Wms_voyFPh7UbKvQmaN

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    VUR3VFRDaUFnUE9PUmJsdlJXVEFlVkdSSEVsU1JB

  • payload_url

    https://g.top4top.io/p_2522c7w8u1.png

  • reconnect_delay

    4

  • server_signature

    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

Targets

    • Target

      stane.exe.bin

    • Size

      42KB

    • MD5

      f6a1256df7865af7d271a8c0d45162a3

    • SHA1

      95d2404a0ca38581b3a961b97c5635d4f5374202

    • SHA256

      23966b7119be128117b4e17ed6c1e0f1861a9913497a8eed288aa09367dc8da5

    • SHA512

      8f213f342a1f8da089732191893895b1d27b3157a386052ffa8993b02a5ff1d015248576a7c04259b0b06b534340c1bfc9f104ffdb8bc25501f5d607ce17befa

    • SSDEEP

      768:jT2KIg20zc8+3KXQvBRkttVu3hmyhxmzRUE98vDB6S4oMv+a7AA:jT2KI36NnPVmhmqxmzGE9YoXoMWa7AA

    • SilverRat

      SilverRat is trojan written in C#.

    • Silverrat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks