General

  • Target

    2025-03-31_4b44bae57f3f8a807330a93b20e51f40_frostygoop_ghostlocker_sliver

  • Size

    21.4MB

  • Sample

    250331-t2jgtatvdv

  • MD5

    4b44bae57f3f8a807330a93b20e51f40

  • SHA1

    25cc4742c554fa995f5e2da478b7bc270ada32ec

  • SHA256

    1be8e68d1b2dd61adb2ab357a9cfd6c017bbb944369eedfcb325c0318d220e76

  • SHA512

    5b921e808496cdc4e66aa4a026abee7fe5249a5cc6641d863ee8fccdb22ed7ceffddc9a25244fc1775a06fa48794111e57413324134cc125704e7f3e81bb127c

  • SSDEEP

    393216:99he6yOPpF6AwVrrsBQsO8sNtmp+UpFSlduaOznPxa5pYJybhwFtE:99he6P0A5BXOReFPZG0S

Malware Config

Targets

    • Target

      2025-03-31_4b44bae57f3f8a807330a93b20e51f40_frostygoop_ghostlocker_sliver

    • Size

      21.4MB

    • MD5

      4b44bae57f3f8a807330a93b20e51f40

    • SHA1

      25cc4742c554fa995f5e2da478b7bc270ada32ec

    • SHA256

      1be8e68d1b2dd61adb2ab357a9cfd6c017bbb944369eedfcb325c0318d220e76

    • SHA512

      5b921e808496cdc4e66aa4a026abee7fe5249a5cc6641d863ee8fccdb22ed7ceffddc9a25244fc1775a06fa48794111e57413324134cc125704e7f3e81bb127c

    • SSDEEP

      393216:99he6yOPpF6AwVrrsBQsO8sNtmp+UpFSlduaOznPxa5pYJybhwFtE:99he6P0A5BXOReFPZG0S

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks