Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
05/04/2025, 19:20
Behavioral task
behavioral1
Sample
fnaf3stingray (2) (1).apk
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
fnaf3stingray (2) (1).apk
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
fnaf3stingray (2) (1).apk
Resource
win11-20250313-en
General
-
Target
fnaf3stingray (2) (1).apk
-
Size
557KB
-
MD5
30a398b39c9b159e81c7ffc1be41329d
-
SHA1
ad578bda21170dd102eac600cbbbe496c284dca1
-
SHA256
d22179ea03e3def991f203790defff6527a92a377a1734bd114af6a71878a60a
-
SHA512
2bab4c870eab096904f4db7682e5d9e8708aeb7d2112e2ea44752abcd359e14f6e2e16cc8f0c3ff56573b7d7d568248822bd0ab351abefa08f05e19372cf1d05
-
SSDEEP
12288:VuvjRH6+O//n3tKpSsM+1HA+kcMBfCb6vgdQPIwdgCir9k6amAs8U2b7m7+Xw:V8N6+ONjstgRl4bJLpCiBDRCUVx
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-73851796-4078923053-1419757224-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-73851796-4078923053-1419757224-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 728 OpenWith.exe