General
-
Target
2025-03-31_08890cbeb681ce6fe19a00fa29c878dd_frostygoop_ghostlocker_sliver
-
Size
5.9MB
-
Sample
250331-szlzgsvpy9
-
MD5
08890cbeb681ce6fe19a00fa29c878dd
-
SHA1
fe29c062ff695bb5ec38617a25223edb01246a48
-
SHA256
c88fac5471260a4600ae5d16c55a82bfe9c1e30367afcd83a46018b9e61dfaf8
-
SHA512
d52cd0553d80cbf8808a54a1ded9d4225cc5445524214b54cee23d5cd470acea9649cf1493e9826de5ee1ad556767d3b77877dd440fbe09dc614be9214f11b9c
-
SSDEEP
98304:QZiPUSI1yo53UM7xJ6zMA8q33nRsKRABzueL:PUSI1yoZmz8uRI
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-31_08890cbeb681ce6fe19a00fa29c878dd_frostygoop_ghostlocker_sliver.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-03-31_08890cbeb681ce6fe19a00fa29c878dd_frostygoop_ghostlocker_sliver
-
Size
5.9MB
-
MD5
08890cbeb681ce6fe19a00fa29c878dd
-
SHA1
fe29c062ff695bb5ec38617a25223edb01246a48
-
SHA256
c88fac5471260a4600ae5d16c55a82bfe9c1e30367afcd83a46018b9e61dfaf8
-
SHA512
d52cd0553d80cbf8808a54a1ded9d4225cc5445524214b54cee23d5cd470acea9649cf1493e9826de5ee1ad556767d3b77877dd440fbe09dc614be9214f11b9c
-
SSDEEP
98304:QZiPUSI1yo53UM7xJ6zMA8q33nRsKRABzueL:PUSI1yoZmz8uRI
-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2