General

  • Target

    818f5550abd2e06a7272f7e93a5e958c730ed8e72723cd6302205871e6dc4da6

  • Size

    43KB

  • Sample

    250417-yhbebasmx9

  • MD5

    d83f71291c934a140c4822ca8d763158

  • SHA1

    372ea7bc3dfee39e6e6713a70bf185e7793b8d1e

  • SHA256

    818f5550abd2e06a7272f7e93a5e958c730ed8e72723cd6302205871e6dc4da6

  • SHA512

    222228e0502c49d813e996d9454adc064c099f622ea0dc776fd0258d8e200d9aab1c7e1793e719647d673e82643eaf12cc553aeaa57239552146f461a274af66

  • SSDEEP

    768:h08uK5B9mKxYV6Ofi/2iZHFPs+nEsJCSZbYvlGGooooizJjwRUT0v9SRHEcaeB6T:h0pKiIOf9GFPs+nEFWJjwGAv9OEWo+/Y

Malware Config

Extracted

Family

silverrat

Version

1.0.0.0

C2

127.0.0.1:9999

Mutex

lAxDBRhAFu

Attributes
  • certificate

    MIIE4DCCAsigAwIBAgIQAKQYOfZd86J2BfNjhG4CWTANBgkqhkiG9w0BAQ0FADARMQ8wDQYDVQQDDAZTaWx2ZXIwIBcNMjIwODI2MTkwMTA4WhgPOTk5OTEyMzEyMzU5NTlaMBExDzANBgNVBAMMBlNpbHZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAPbpOWfhZTuOfEaqqImTTe5dNHAAry7/mf00DCoI4lPZfypsc1tYraxSPFeayGu09a3qdhkWKSVIgwnu2n4GLQNOCY9fh/1oyrX4Iir3BIkYeU7pKTWgjhUlAmFAUAaNr0ca23Ku2kN79jrDzRznOgE2DEW4p7OiM4Mb097ma9lzu7MyssHbY4VCteAhj9HZiplqBxaC1vXDmzxqG+gUZ1aLcyG7ssdkOjtWVBgT3gD/gOl7KchRzCFB1egDC/vD9WZCG35U3Ngi+IkTznoXR1R06cq4v0UnGjE37R2vcB21qb0ZYNiZJXZHv5i9+R7xoPeNoLda5PqnfGGbhPvNEdD56mdcOKlzGIuyemLkUo8texdpiBWKbtc3JZf5VsKxjJtHDK3xW6gDGI+PAirzGkFPmwcf8WgsblvzLg8OZpVxVs8rmKWoi6qIrf4CXnyl73J4lgzW+ir7PjANAQXwLNGdNnvdMeLeo/muGQPdeNpr6OczGGnkWA4qniHeL51/Gx0a8A+jP9zKiyu+qHcsP2IotgWDH/KlzJVr7IAum+DV92uV8poTDcUNcHaKvhHA65KmEtsvLbK6lFZcAMC0eWC0VgpW44T1/16rOaaky5mP6rTMc3nSyOl/lU/XgAgGGQPe22bRLWYzd3WVeEpI1WnHYXS+tL9IOe4kJP+pYsWDAgMBAAGjMjAwMB0GA1UdDgQWBBR32TJj2LeUx9L+RcSOvmFV6VJq6TAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQA+qucSOi7ov7Q1FmAjMf925KuvKuCNwJiu3Sqo3FDGVAD1fAwAi2FdyuXEO2VIUPZCkalFcBna5rqyrc6tcS4T0IL2TsYLrsuGir7PWP7CAcft1urYS1HpNpHxeH/nixwnQaQs/MuRmdm2TeCj6G21P5BTW55U5y9sMPSYwhbD2N7XLgnSQd5Y+80TR7FUiye/k3D37fI9PRhSQGbfYFRQQTmxj84dPTnY5CVgaY9d8fNiFZkyjaZdf+mibK0xQTf+xLVVj+toDNCkc1F462TdmFhCrHd4PoMo0yLDNv4SC6NLRq4haWDRtORw6gd5GYIoCQ3m3oQvNlNxXhhIjsOyxkxOrkCD0c+57PIc7EmKXieJa/XxnkcIVxO8dvTY/vijuz/VaZYl/lPu9ckuqgJ1wRvvsHl70Trv4Mn4X5uCIqRFFlK/mSOZbLIguGkDN3QIZABvej89vlZMhrVfZOG2oawe23FskHjv7thF/WzOXtWw6RUVC1V+hCwbuxFNUjZmmOTUwdXHnus7I2AuiG6Jz1+y9aYiXBcVTdSljxjHRRmiRaAnY94h58vN8NJ4hKL2GVCo6LxkpuplmcntJN0cKraKTPxSXcCRrqWxX9qoIbfvBcUU4vH1jPJCCLNCuDyD3lgQkpPVvq0EMU1a2HFGgMEQMjpYpb38rcadDhT5ag==

  • decrypted_key

    -|S.S.S|-

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    RWNrQ1R6bExNUXloekVPSmdmT3dsR0RXeHNFRFNU

  • reconnect_delay

    2

  • server_signature

    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

Targets

    • Target

      818f5550abd2e06a7272f7e93a5e958c730ed8e72723cd6302205871e6dc4da6

    • Size

      43KB

    • MD5

      d83f71291c934a140c4822ca8d763158

    • SHA1

      372ea7bc3dfee39e6e6713a70bf185e7793b8d1e

    • SHA256

      818f5550abd2e06a7272f7e93a5e958c730ed8e72723cd6302205871e6dc4da6

    • SHA512

      222228e0502c49d813e996d9454adc064c099f622ea0dc776fd0258d8e200d9aab1c7e1793e719647d673e82643eaf12cc553aeaa57239552146f461a274af66

    • SSDEEP

      768:h08uK5B9mKxYV6Ofi/2iZHFPs+nEsJCSZbYvlGGooooizJjwRUT0v9SRHEcaeB6T:h0pKiIOf9GFPs+nEFWJjwGAv9OEWo+/Y

    • SilverRat

      SilverRat is trojan written in C#.

    • Silverrat family

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v16

Tasks