General
-
Target
2025-03-31_4b44bae57f3f8a807330a93b20e51f40_frostygoop_ghostlocker_sliver
-
Size
21.4MB
-
Sample
250331-t2jgtatvdv
-
MD5
4b44bae57f3f8a807330a93b20e51f40
-
SHA1
25cc4742c554fa995f5e2da478b7bc270ada32ec
-
SHA256
1be8e68d1b2dd61adb2ab357a9cfd6c017bbb944369eedfcb325c0318d220e76
-
SHA512
5b921e808496cdc4e66aa4a026abee7fe5249a5cc6641d863ee8fccdb22ed7ceffddc9a25244fc1775a06fa48794111e57413324134cc125704e7f3e81bb127c
-
SSDEEP
393216:99he6yOPpF6AwVrrsBQsO8sNtmp+UpFSlduaOznPxa5pYJybhwFtE:99he6P0A5BXOReFPZG0S
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-31_4b44bae57f3f8a807330a93b20e51f40_frostygoop_ghostlocker_sliver.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-03-31_4b44bae57f3f8a807330a93b20e51f40_frostygoop_ghostlocker_sliver
-
Size
21.4MB
-
MD5
4b44bae57f3f8a807330a93b20e51f40
-
SHA1
25cc4742c554fa995f5e2da478b7bc270ada32ec
-
SHA256
1be8e68d1b2dd61adb2ab357a9cfd6c017bbb944369eedfcb325c0318d220e76
-
SHA512
5b921e808496cdc4e66aa4a026abee7fe5249a5cc6641d863ee8fccdb22ed7ceffddc9a25244fc1775a06fa48794111e57413324134cc125704e7f3e81bb127c
-
SSDEEP
393216:99he6yOPpF6AwVrrsBQsO8sNtmp+UpFSlduaOznPxa5pYJybhwFtE:99he6P0A5BXOReFPZG0S
Score10/10-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Suspicious use of SetThreadContext
-