Analysis
-
max time kernel
104s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2025, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-17_829b23998e2e363fbdf62899e56b93fa_frostygoop_ghostlocker_knight_luca-stealer.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-17_829b23998e2e363fbdf62899e56b93fa_frostygoop_ghostlocker_knight_luca-stealer.exe
Resource
win11-20250411-en
General
-
Target
2025-04-17_829b23998e2e363fbdf62899e56b93fa_frostygoop_ghostlocker_knight_luca-stealer.exe
-
Size
2.8MB
-
MD5
829b23998e2e363fbdf62899e56b93fa
-
SHA1
d648ed8e96285dc7b38265ffd4f8a0b40cb151d2
-
SHA256
7a286c84b6ed0e75b68d9bd2318516edd2c156df8374ac6394e8fdd34bd4e10d
-
SHA512
2694edbdb320e94dfb90390e9a6ac680a24cb668223e9e1b67e8a32f610fb0175d7f09f7e7e1dffc598a7bd7f9cea74bf8b06e27d5bc91d648c1145bc80b3649
-
SSDEEP
49152:t61woRhtyGPTOjMjImaDRZLHNryL3eUzCa1Ci1Cz2Uo:t65tE3ByL3/9Ci1y2N
Malware Config
Extracted
metasploit
metasploit_stager
192.168.0.107:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2628 wrote to memory of 5720 2628 2025-04-17_829b23998e2e363fbdf62899e56b93fa_frostygoop_ghostlocker_knight_luca-stealer.exe 85 PID 2628 wrote to memory of 5720 2628 2025-04-17_829b23998e2e363fbdf62899e56b93fa_frostygoop_ghostlocker_knight_luca-stealer.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-17_829b23998e2e363fbdf62899e56b93fa_frostygoop_ghostlocker_knight_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-17_829b23998e2e363fbdf62899e56b93fa_frostygoop_ghostlocker_knight_luca-stealer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\System32\notepad.exeC:\Windows\System32\notepad.exe2⤵PID:5720
-