General
-
Target
2025-04-18_7045cd8785aa7d9caa2ba378363dd051_elex_frostygoop_ghostlocker_sliver
-
Size
21.4MB
-
Sample
250418-za4lkat1fx
-
MD5
7045cd8785aa7d9caa2ba378363dd051
-
SHA1
a7bc1b3074ef3cb4c645d1db3197138191ce9cb4
-
SHA256
b2bc50d6e956c1354704fca3ce5deb206b09ac31cef9136d1034c11eb9f81090
-
SHA512
bc86d276d1bad3ab2baa91ea4659383277a76b21c99af53a8e8501e92a19064516af6eeba8a7d4e70135a4f1418ccf96bdade89d996bb345f6216cec9f0bc522
-
SSDEEP
393216:wNVfvW/1YXeguzGEGX9Nrl2PwnQKBWlR0JkLT4V/5J1Ehg:wNVfs1t2VleP+6T4XDJ
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-18_7045cd8785aa7d9caa2ba378363dd051_elex_frostygoop_ghostlocker_sliver.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
2025-04-18_7045cd8785aa7d9caa2ba378363dd051_elex_frostygoop_ghostlocker_sliver.exe
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
2025-04-18_7045cd8785aa7d9caa2ba378363dd051_elex_frostygoop_ghostlocker_sliver
-
Size
21.4MB
-
MD5
7045cd8785aa7d9caa2ba378363dd051
-
SHA1
a7bc1b3074ef3cb4c645d1db3197138191ce9cb4
-
SHA256
b2bc50d6e956c1354704fca3ce5deb206b09ac31cef9136d1034c11eb9f81090
-
SHA512
bc86d276d1bad3ab2baa91ea4659383277a76b21c99af53a8e8501e92a19064516af6eeba8a7d4e70135a4f1418ccf96bdade89d996bb345f6216cec9f0bc522
-
SSDEEP
393216:wNVfvW/1YXeguzGEGX9Nrl2PwnQKBWlR0JkLT4V/5J1Ehg:wNVfs1t2VleP+6T4XDJ
-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2