0.2.powershell.exe.219ace53b18.5.raw.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0x5c8:$x2: https://github.com/LimerBoy/StormKitty
- 0x5e4:$x3: StormKitty
|
0.2.powershell.exe.219ace4d6e0.7.raw.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0x6a00:$x2: https://github.com/LimerBoy/StormKitty
- 0x6a1c:$x3: StormKitty
|
0.2.powershell.exe.219ab9e88f8.2.raw.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0x5c8:$x2: https://github.com/LimerBoy/StormKitty
- 0x5e4:$x3: StormKitty
|
0.2.powershell.exe.219acd82cf6.0.raw.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0x5c8:$x2: https://github.com/LimerBoy/StormKitty
- 0x5e4:$x3: StormKitty
|
0.2.powershell.exe.219ab9a4e58.4.raw.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0x44068:$x2: https://github.com/LimerBoy/StormKitty
- 0x44084:$x3: StormKitty
|
0.2.powershell.exe.219acd986b0.3.raw.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0xbba30:$x2: https://github.com/LimerBoy/StormKitty
- 0xbba4c:$x3: StormKitty
|
0.2.powershell.exe.219ab9a19ce.6.raw.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0x5c8:$x2: https://github.com/LimerBoy/StormKitty
- 0x474f2:$x2: https://github.com/LimerBoy/StormKitty
- 0x5e4:$x3: StormKitty
- 0x4750e:$x3: StormKitty
|
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | JoeSecurity_VenomRAT | Yara detected VenomRAT | Joe Security | |
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | JoeSecurity_BrowserPasswordDump_1 | Yara detected BrowserPasswordDump | Joe Security | |
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | JoeSecurity_Keylogger_Generic_3 | Yara detected Keylogger Generic | Joe Security | |
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | Windows_Trojan_DCRat_1aeea1ac | unknown | unknown | - 0x11d67e:$a1: havecamera
- 0x1684a8:$a2: timeout 3 > NUL
- 0x16b82b:$a3: START "" "
- 0x16bd40:$a3: START "" "
- 0x16bc1b:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
- 0x16bcb8:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
|
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | infostealer_win_stealerium | Detects Stealerium based on specific strings | Sekoia.io | - 0x16eba2:$str01: Processe:
- 0x16ea5e:$str02: Compname:
- 0x16eb58:$str04: SandBoxie:
- 0x16eaee:$str08: WEBCAMS COUNT:
- 0x16eb12:$str09: [Virtualization]
- 0x16f360:$str10: [Open google maps](
- 0x170dd7:$str11: Remember password:
- 0x163eca:$str12: Target.Browsers.Firefox
- 0x14b645:$str13: Modules.Keylogger
- 0x153508:$str14: ClipperAddresses
- 0x1556ad:$str15: ChromiumPswPaths
- 0x1556bf:$str15: ChromiumPswPaths
- 0x151602:$str16: DetectedBankingServices
- 0x15176b:$str17: DetectCryptocurrencyServices
- 0x15f664:$str18: CheckRemoteDebuggerPresent
- 0x1605e9:$str19: GetConnectedCamerasCount
|
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | infostealer_win_stormkitty | Finds StormKitty samples (or their variants) based on specific strings | Sekoia.io | - 0x12ebc8:$str01: set_sUsername
- 0x13c0fa:$str03: set_sExpMonth
- 0x1514b5:$str04: WritePasswords
- 0x151f6f:$str05: WriteCookies
- 0x1556be:$str06: sChromiumPswPaths
- 0x155699:$str07: sGeckoBrowserPaths
- 0x16ad45:$str10: encrypted_key":"(.*?)"
|
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x16bcb8:$str02: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
- 0x167d88:$str04: Pac_ket
- 0x177aa6:$str05: Perfor_mance
- 0x177aea:$str06: Install_ed
- 0x12217b:$str07: get_IsConnected
- 0x138640:$str08: get_ActivatePo_ng
- 0x14c57b:$str09: isVM_by_wim_temper
- 0x178398:$str10: save_Plugin
- 0x1684a8:$str11: timeout 3 > NUL
- 0x177686:$str12: ProcessHacker.exe
- 0x177878:$str13: Select * from Win32_CacheMemory
|
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen | - 0x16bcb8:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
- 0x16bc1b:$s2: L2Mgc2NodGFza3MgL2
|
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x177878:$q1: Select * from Win32_CacheMemory
- 0x1778b8:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x177906:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x177954:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x16fa7c:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | INDICATOR_SUSPICIOUS_EXE_References_VPN | Detects executables referencing many VPN software clients. Observed in infosteslers | ditekSHen | - 0x175417:$s1: \VPN\NordVPN
- 0x1753fd:$s2: \VPN\OpenVPN
- 0x1753df:$s3: \VPN\ProtonVPN
|
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x16a161:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x16a1d3:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x16a25d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x16a2ef:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x16a359:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x16a3cb:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x16a461:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x16a4f1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.powershell.exe.219bbf8cb0a.11.raw.unpack | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x167d18:$s3: {{ ProcessId = {0}, Name = {1}, ExecutablePath = {2} }}
- 0x163e8c:$s6: VirtualBox
- 0x173a0b:$s6: VirtualBox
- 0x16f428:$s8: Win32_ComputerSystem
- 0x173971:$s8: Win32_ComputerSystem
- 0x16c554:$s9: Win32_Process Where ParentProcessID=
- 0x16c171:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x16c20e:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x16c323:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x16c40b:$cnc4: POST / HTTP/1.1
|
0.2.powershell.exe.219bb89f062.8.raw.unpack | JoeSecurity_VenomRAT | Yara detected VenomRAT | Joe Security | |
0.2.powershell.exe.219bb89f062.8.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.powershell.exe.219bb89f062.8.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
0.2.powershell.exe.219bb89f062.8.raw.unpack | JoeSecurity_BrowserPasswordDump_1 | Yara detected BrowserPasswordDump | Joe Security | |
0.2.powershell.exe.219bb89f062.8.raw.unpack | JoeSecurity_Keylogger_Generic_3 | Yara detected Keylogger Generic | Joe Security | |
0.2.powershell.exe.219bb89f062.8.raw.unpack | Windows_Trojan_DCRat_1aeea1ac | unknown | unknown | - 0x11d6b6:$a1: havecamera
- 0x1684e0:$a2: timeout 3 > NUL
- 0x16b863:$a3: START "" "
- 0x16bd78:$a3: START "" "
- 0x16bc53:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
- 0x16bcf0:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
|
0.2.powershell.exe.219bb89f062.8.raw.unpack | infostealer_win_stealerium | Detects Stealerium based on specific strings | Sekoia.io | - 0x16ebda:$str01: Processe:
- 0x16ea96:$str02: Compname:
- 0x16eb90:$str04: SandBoxie:
- 0x16eb26:$str08: WEBCAMS COUNT:
- 0x16eb4a:$str09: [Virtualization]
- 0x16f398:$str10: [Open google maps](
- 0x170e0f:$str11: Remember password:
- 0x163f02:$str12: Target.Browsers.Firefox
- 0x14b67d:$str13: Modules.Keylogger
- 0x153540:$str14: ClipperAddresses
- 0x1556e5:$str15: ChromiumPswPaths
- 0x1556f7:$str15: ChromiumPswPaths
- 0x15163a:$str16: DetectedBankingServices
- 0x1517a3:$str17: DetectCryptocurrencyServices
- 0x15f69c:$str18: CheckRemoteDebuggerPresent
- 0x160621:$str19: GetConnectedCamerasCount
|
0.2.powershell.exe.219bb89f062.8.raw.unpack | infostealer_win_stormkitty | Finds StormKitty samples (or their variants) based on specific strings | Sekoia.io | - 0x12ec00:$str01: set_sUsername
- 0x13c132:$str03: set_sExpMonth
- 0x1514ed:$str04: WritePasswords
- 0x151fa7:$str05: WriteCookies
- 0x1556f6:$str06: sChromiumPswPaths
- 0x1556d1:$str07: sGeckoBrowserPaths
- 0x16ad7d:$str10: encrypted_key":"(.*?)"
|
0.2.powershell.exe.219bb89f062.8.raw.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x16bcf0:$str02: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
- 0x167dc0:$str04: Pac_ket
- 0x177ade:$str05: Perfor_mance
- 0x177b22:$str06: Install_ed
- 0x1221b3:$str07: get_IsConnected
- 0x138678:$str08: get_ActivatePo_ng
- 0x14c5b3:$str09: isVM_by_wim_temper
- 0x1783d0:$str10: save_Plugin
- 0x1684e0:$str11: timeout 3 > NUL
- 0x1776be:$str12: ProcessHacker.exe
- 0x1778b0:$str13: Select * from Win32_CacheMemory
|
0.2.powershell.exe.219bb89f062.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen | - 0x16bcf0:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
- 0x16bc53:$s2: L2Mgc2NodGFza3MgL2
|
0.2.powershell.exe.219bb89f062.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x1778b0:$q1: Select * from Win32_CacheMemory
- 0x1778f0:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x17793e:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x17798c:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
0.2.powershell.exe.219bb89f062.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x16fab4:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
0.2.powershell.exe.219bb89f062.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_References_VPN | Detects executables referencing many VPN software clients. Observed in infosteslers | ditekSHen | - 0x17544f:$s1: \VPN\NordVPN
- 0x175435:$s2: \VPN\OpenVPN
- 0x175417:$s3: \VPN\ProtonVPN
|
0.2.powershell.exe.219bb89f062.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x16a199:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x16a20b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x16a295:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x16a327:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x16a391:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x16a403:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x16a499:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x16a529:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.powershell.exe.219bb89f062.8.raw.unpack | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x167d50:$s3: {{ ProcessId = {0}, Name = {1}, ExecutablePath = {2} }}
- 0x163ec4:$s6: VirtualBox
- 0x173a43:$s6: VirtualBox
- 0x16f460:$s8: Win32_ComputerSystem
- 0x1739a9:$s8: Win32_ComputerSystem
- 0x16c58c:$s9: Win32_Process Where ParentProcessID=
- 0x16c1a9:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x16c246:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x16c35b:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x16c443:$cnc4: POST / HTTP/1.1
|
10.2.RegAsm.exe.525b8a.0.raw.unpack | JoeSecurity_VenomRAT | Yara detected VenomRAT | Joe Security | |
10.2.RegAsm.exe.525b8a.0.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
10.2.RegAsm.exe.525b8a.0.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
10.2.RegAsm.exe.525b8a.0.raw.unpack | JoeSecurity_BrowserPasswordDump_1 | Yara detected BrowserPasswordDump | Joe Security | |
10.2.RegAsm.exe.525b8a.0.raw.unpack | JoeSecurity_Keylogger_Generic_3 | Yara detected Keylogger Generic | Joe Security | |
10.2.RegAsm.exe.525b8a.0.raw.unpack | Windows_Trojan_DCRat_1aeea1ac | unknown | unknown | - 0x11d67e:$a1: havecamera
- 0x1684a8:$a2: timeout 3 > NUL
- 0x16b82b:$a3: START "" "
- 0x16bd40:$a3: START "" "
- 0x16bc1b:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
- 0x16bcb8:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
|
10.2.RegAsm.exe.525b8a.0.raw.unpack | infostealer_win_stealerium | Detects Stealerium based on specific strings | Sekoia.io | - 0x16eba2:$str01: Processe:
- 0x16ea5e:$str02: Compname:
- 0x16eb58:$str04: SandBoxie:
- 0x16eaee:$str08: WEBCAMS COUNT:
- 0x16eb12:$str09: [Virtualization]
- 0x16f360:$str10: [Open google maps](
- 0x170dd7:$str11: Remember password:
- 0x163eca:$str12: Target.Browsers.Firefox
- 0x14b645:$str13: Modules.Keylogger
- 0x153508:$str14: ClipperAddresses
- 0x1556ad:$str15: ChromiumPswPaths
- 0x1556bf:$str15: ChromiumPswPaths
- 0x151602:$str16: DetectedBankingServices
- 0x15176b:$str17: DetectCryptocurrencyServices
- 0x15f664:$str18: CheckRemoteDebuggerPresent
- 0x1605e9:$str19: GetConnectedCamerasCount
|
10.2.RegAsm.exe.525b8a.0.raw.unpack | infostealer_win_stormkitty | Finds StormKitty samples (or their variants) based on specific strings | Sekoia.io | - 0x12ebc8:$str01: set_sUsername
- 0x13c0fa:$str03: set_sExpMonth
- 0x1514b5:$str04: WritePasswords
- 0x151f6f:$str05: WriteCookies
- 0x1556be:$str06: sChromiumPswPaths
- 0x155699:$str07: sGeckoBrowserPaths
- 0x16ad45:$str10: encrypted_key":"(.*?)"
|
10.2.RegAsm.exe.525b8a.0.raw.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x16bcb8:$str02: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
- 0x167d88:$str04: Pac_ket
- 0x177aa6:$str05: Perfor_mance
- 0x177aea:$str06: Install_ed
- 0x12217b:$str07: get_IsConnected
- 0x138640:$str08: get_ActivatePo_ng
- 0x14c57b:$str09: isVM_by_wim_temper
- 0x178398:$str10: save_Plugin
- 0x1684a8:$str11: timeout 3 > NUL
- 0x177686:$str12: ProcessHacker.exe
- 0x177878:$str13: Select * from Win32_CacheMemory
|
10.2.RegAsm.exe.525b8a.0.raw.unpack | INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen | - 0x16bcb8:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
- 0x16bc1b:$s2: L2Mgc2NodGFza3MgL2
|
10.2.RegAsm.exe.525b8a.0.raw.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x177878:$q1: Select * from Win32_CacheMemory
- 0x1778b8:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x177906:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x177954:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
10.2.RegAsm.exe.525b8a.0.raw.unpack | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x16fa7c:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
10.2.RegAsm.exe.525b8a.0.raw.unpack | INDICATOR_SUSPICIOUS_EXE_References_VPN | Detects executables referencing many VPN software clients. Observed in infosteslers | ditekSHen | - 0x175417:$s1: \VPN\NordVPN
- 0x1753fd:$s2: \VPN\OpenVPN
- 0x1753df:$s3: \VPN\ProtonVPN
|
10.2.RegAsm.exe.525b8a.0.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x16a161:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x16a1d3:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x16a25d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x16a2ef:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x16a359:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x16a3cb:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x16a461:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x16a4f1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
10.2.RegAsm.exe.525b8a.0.raw.unpack | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x167d18:$s3: {{ ProcessId = {0}, Name = {1}, ExecutablePath = {2} }}
- 0x163e8c:$s6: VirtualBox
- 0x173a0b:$s6: VirtualBox
- 0x16f428:$s8: Win32_ComputerSystem
- 0x173971:$s8: Win32_ComputerSystem
- 0x16c554:$s9: Win32_Process Where ParentProcessID=
- 0x16c171:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x16c20e:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x16c323:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x16c40b:$cnc4: POST / HTTP/1.1
|
0.2.powershell.exe.219bbb6b348.9.unpack | JoeSecurity_VenomRAT | Yara detected VenomRAT | Joe Security | |
0.2.powershell.exe.219bbb6b348.9.unpack | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
0.2.powershell.exe.219bbb6b348.9.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.powershell.exe.219bbb6b348.9.unpack | JoeSecurity_BrowserPasswordDump_1 | Yara detected BrowserPasswordDump | Joe Security | |
0.2.powershell.exe.219bbb6b348.9.unpack | JoeSecurity_Keylogger_Generic_3 | Yara detected Keylogger Generic | Joe Security | |
0.2.powershell.exe.219bbb6b348.9.unpack | Windows_Trojan_DCRat_1aeea1ac | unknown | unknown | - 0x23f608:$a1: havecamera
- 0x28a432:$a2: timeout 3 > NUL
- 0x28d7b5:$a3: START "" "
- 0x28dcca:$a3: START "" "
- 0x28dba5:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
- 0x28dc42:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
|
0.2.powershell.exe.219bbb6b348.9.unpack | infostealer_win_stealerium | Detects Stealerium based on specific strings | Sekoia.io | - 0x290b2c:$str01: Processe:
- 0x2909e8:$str02: Compname:
- 0x290ae2:$str04: SandBoxie:
- 0x290a78:$str08: WEBCAMS COUNT:
- 0x290a9c:$str09: [Virtualization]
- 0x2912ea:$str10: [Open google maps](
- 0x292d61:$str11: Remember password:
- 0x285e54:$str12: Target.Browsers.Firefox
- 0x26d5cf:$str13: Modules.Keylogger
- 0x275492:$str14: ClipperAddresses
- 0x277637:$str15: ChromiumPswPaths
- 0x277649:$str15: ChromiumPswPaths
- 0x27358c:$str16: DetectedBankingServices
- 0x2736f5:$str17: DetectCryptocurrencyServices
- 0x2815ee:$str18: CheckRemoteDebuggerPresent
- 0x282573:$str19: GetConnectedCamerasCount
|
0.2.powershell.exe.219bbb6b348.9.unpack | infostealer_win_stormkitty | Finds StormKitty samples (or their variants) based on specific strings | Sekoia.io | - 0x2fc213:$sk01: LimerBoy/StormKitty
- 0x250b52:$str01: set_sUsername
- 0x25e084:$str03: set_sExpMonth
- 0x27343f:$str04: WritePasswords
- 0x273ef9:$str05: WriteCookies
- 0x277648:$str06: sChromiumPswPaths
- 0x277623:$str07: sGeckoBrowserPaths
- 0x28cccf:$str10: encrypted_key":"(.*?)"
|
0.2.powershell.exe.219bbb6b348.9.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x28dc42:$str02: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
- 0x289d12:$str04: Pac_ket
- 0x299a30:$str05: Perfor_mance
- 0x299a74:$str06: Install_ed
- 0x244105:$str07: get_IsConnected
- 0x25a5ca:$str08: get_ActivatePo_ng
- 0x26e505:$str09: isVM_by_wim_temper
- 0x29a322:$str10: save_Plugin
- 0x28a432:$str11: timeout 3 > NUL
- 0x299610:$str12: ProcessHacker.exe
- 0x299802:$str13: Select * from Win32_CacheMemory
|
0.2.powershell.exe.219bbb6b348.9.unpack | INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen | - 0x28dc42:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
- 0x28dba5:$s2: L2Mgc2NodGFza3MgL2
|
0.2.powershell.exe.219bbb6b348.9.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x299802:$q1: Select * from Win32_CacheMemory
- 0x299842:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x299890:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x2998de:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
0.2.powershell.exe.219bbb6b348.9.unpack | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x291a06:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
0.2.powershell.exe.219bbb6b348.9.unpack | INDICATOR_SUSPICIOUS_EXE_References_VPN | Detects executables referencing many VPN software clients. Observed in infosteslers | ditekSHen | - 0x2973a1:$s1: \VPN\NordVPN
- 0x297387:$s2: \VPN\OpenVPN
- 0x297369:$s3: \VPN\ProtonVPN
|
0.2.powershell.exe.219bbb6b348.9.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x28c0eb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x28c15d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x28c1e7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x28c279:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x28c2e3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x28c355:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x28c3eb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x28c47b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.powershell.exe.219bbb6b348.9.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0x2fc200:$x2: https://github.com/LimerBoy/StormKitty
- 0x2fc21c:$x3: StormKitty
- 0x27c1f4:$s2: GetAntivirus
- 0x29225a:$s4: ^([a-zA-Z0-9_\-\.]+)@([a-zA-Z0-9_\-\.]+)\.([a-zA-Z]{2,5})$
- 0x28b6a5:$s5: BCrypt.BCryptGetProperty() (get size) failed with status code:{0}
- 0x28cccd:$s6: "encrypted_key":"(.*?)"
|
0.2.powershell.exe.219bbb6b348.9.unpack | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x289ca2:$s3: {{ ProcessId = {0}, Name = {1}, ExecutablePath = {2} }}
- 0x285e16:$s6: VirtualBox
- 0x295995:$s6: VirtualBox
- 0x2913b2:$s8: Win32_ComputerSystem
- 0x2958fb:$s8: Win32_ComputerSystem
- 0x28e4de:$s9: Win32_Process Where ParentProcessID=
- 0x28e0fb:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x28e198:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x28e2ad:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x28e395:$cnc4: POST / HTTP/1.1
|
10.2.RegAsm.exe.400000.1.unpack | JoeSecurity_VenomRAT | Yara detected VenomRAT | Joe Security | |
10.2.RegAsm.exe.400000.1.unpack | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
10.2.RegAsm.exe.400000.1.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
10.2.RegAsm.exe.400000.1.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
10.2.RegAsm.exe.400000.1.unpack | JoeSecurity_BrowserPasswordDump_1 | Yara detected BrowserPasswordDump | Joe Security | |
10.2.RegAsm.exe.400000.1.unpack | JoeSecurity_Keylogger_Generic_3 | Yara detected Keylogger Generic | Joe Security | |
10.2.RegAsm.exe.400000.1.unpack | Windows_Trojan_DCRat_1aeea1ac | unknown | unknown | - 0x241408:$a1: havecamera
- 0x28c232:$a2: timeout 3 > NUL
- 0x28f5b5:$a3: START "" "
- 0x28faca:$a3: START "" "
- 0x28f9a5:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
- 0x28fa42:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
|
10.2.RegAsm.exe.400000.1.unpack | infostealer_win_stealerium | Detects Stealerium based on specific strings | Sekoia.io | - 0x29292c:$str01: Processe:
- 0x2927e8:$str02: Compname:
- 0x2928e2:$str04: SandBoxie:
- 0x292878:$str08: WEBCAMS COUNT:
- 0x29289c:$str09: [Virtualization]
- 0x2930ea:$str10: [Open google maps](
- 0x294b61:$str11: Remember password:
- 0x287c54:$str12: Target.Browsers.Firefox
- 0x26f3cf:$str13: Modules.Keylogger
- 0x277292:$str14: ClipperAddresses
- 0x279437:$str15: ChromiumPswPaths
- 0x279449:$str15: ChromiumPswPaths
- 0x27538c:$str16: DetectedBankingServices
- 0x2754f5:$str17: DetectCryptocurrencyServices
- 0x2833ee:$str18: CheckRemoteDebuggerPresent
- 0x284373:$str19: GetConnectedCamerasCount
|
10.2.RegAsm.exe.400000.1.unpack | infostealer_win_stormkitty | Finds StormKitty samples (or their variants) based on specific strings | Sekoia.io | - 0x5db:$sk01: LimerBoy/StormKitty
- 0x252952:$str01: set_sUsername
- 0x25fe84:$str03: set_sExpMonth
- 0x27523f:$str04: WritePasswords
- 0x275cf9:$str05: WriteCookies
- 0x279448:$str06: sChromiumPswPaths
- 0x279423:$str07: sGeckoBrowserPaths
- 0x28eacf:$str10: encrypted_key":"(.*?)"
|
10.2.RegAsm.exe.400000.1.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x28fa42:$str02: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
- 0x28bb12:$str04: Pac_ket
- 0x29b830:$str05: Perfor_mance
- 0x29b874:$str06: Install_ed
- 0x245f05:$str07: get_IsConnected
- 0x25c3ca:$str08: get_ActivatePo_ng
- 0x270305:$str09: isVM_by_wim_temper
- 0x29c122:$str10: save_Plugin
- 0x28c232:$str11: timeout 3 > NUL
- 0x29b410:$str12: ProcessHacker.exe
- 0x29b602:$str13: Select * from Win32_CacheMemory
|
10.2.RegAsm.exe.400000.1.unpack | INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen | - 0x28fa42:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
- 0x28f9a5:$s2: L2Mgc2NodGFza3MgL2
|
10.2.RegAsm.exe.400000.1.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x29b602:$q1: Select * from Win32_CacheMemory
- 0x29b642:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x29b690:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x29b6de:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
10.2.RegAsm.exe.400000.1.unpack | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x293806:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
10.2.RegAsm.exe.400000.1.unpack | INDICATOR_SUSPICIOUS_EXE_References_VPN | Detects executables referencing many VPN software clients. Observed in infosteslers | ditekSHen | - 0x2991a1:$s1: \VPN\NordVPN
- 0x299187:$s2: \VPN\OpenVPN
- 0x299169:$s3: \VPN\ProtonVPN
|
10.2.RegAsm.exe.400000.1.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x28deeb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x28df5d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x28dfe7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x28e079:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x28e0e3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x28e155:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x28e1eb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x28e27b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
10.2.RegAsm.exe.400000.1.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0x5c8:$x2: https://github.com/LimerBoy/StormKitty
- 0x5e4:$x3: StormKitty
- 0x27dff4:$s2: GetAntivirus
- 0x29405a:$s4: ^([a-zA-Z0-9_\-\.]+)@([a-zA-Z0-9_\-\.]+)\.([a-zA-Z]{2,5})$
- 0x28d4a5:$s5: BCrypt.BCryptGetProperty() (get size) failed with status code:{0}
- 0x28eacd:$s6: "encrypted_key":"(.*?)"
|
10.2.RegAsm.exe.400000.1.unpack | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x28baa2:$s3: {{ ProcessId = {0}, Name = {1}, ExecutablePath = {2} }}
- 0x287c16:$s6: VirtualBox
- 0x297795:$s6: VirtualBox
- 0x2931b2:$s8: Win32_ComputerSystem
- 0x2976fb:$s8: Win32_ComputerSystem
- 0x2902de:$s9: Win32_Process Where ParentProcessID=
- 0x28fefb:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x28ff98:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x2900ad:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x290195:$cnc4: POST / HTTP/1.1
|
0.2.powershell.exe.219acd82cf6.0.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0xcf5ea:$x2: https://github.com/LimerBoy/StormKitty
- 0xcf606:$x3: StormKitty
|
0.2.powershell.exe.219ab9a19ce.6.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0x456f2:$x2: https://github.com/LimerBoy/StormKitty
- 0x4570e:$x3: StormKitty
|
0.2.powershell.exe.219bbb6b348.9.raw.unpack | JoeSecurity_VenomRAT | Yara detected VenomRAT | Joe Security | |
0.2.powershell.exe.219bbb6b348.9.raw.unpack | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
0.2.powershell.exe.219bbb6b348.9.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.powershell.exe.219bbb6b348.9.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
0.2.powershell.exe.219bbb6b348.9.raw.unpack | JoeSecurity_BrowserPasswordDump_1 | Yara detected BrowserPasswordDump | Joe Security | |
0.2.powershell.exe.219bbb6b348.9.raw.unpack | JoeSecurity_Keylogger_Generic_3 | Yara detected Keylogger Generic | Joe Security | |
0.2.powershell.exe.219bbb6b348.9.raw.unpack | Windows_Trojan_DCRat_1aeea1ac | unknown | unknown | - 0x241408:$a1: havecamera
- 0x53ee40:$a1: havecamera
- 0x28c232:$a2: timeout 3 > NUL
- 0x589c6a:$a2: timeout 3 > NUL
- 0x28f5b5:$a3: START "" "
- 0x28faca:$a3: START "" "
- 0x58cfed:$a3: START "" "
- 0x58d502:$a3: START "" "
- 0x28f9a5:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
- 0x58d3dd:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
- 0x28fa42:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
- 0x58d47a:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
|
0.2.powershell.exe.219bbb6b348.9.raw.unpack | infostealer_win_stealerium | Detects Stealerium based on specific strings | Sekoia.io | - 0x29292c:$str01: Processe:
- 0x590364:$str01: Processe:
- 0x2927e8:$str02: Compname:
- 0x590220:$str02: Compname:
- 0x2928e2:$str04: SandBoxie:
- 0x59031a:$str04: SandBoxie:
- 0x292878:$str08: WEBCAMS COUNT:
- 0x5902b0:$str08: WEBCAMS COUNT:
- 0x29289c:$str09: [Virtualization]
- 0x5902d4:$str09: [Virtualization]
- 0x2930ea:$str10: [Open google maps](
- 0x590b22:$str10: [Open google maps](
- 0x294b61:$str11: Remember password:
- 0x592599:$str11: Remember password:
- 0x287c54:$str12: Target.Browsers.Firefox
- 0x58568c:$str12: Target.Browsers.Firefox
- 0x26f3cf:$str13: Modules.Keylogger
- 0x56ce07:$str13: Modules.Keylogger
- 0x277292:$str14: ClipperAddresses
- 0x574cca:$str14: ClipperAddresses
- 0x279437:$str15: ChromiumPswPaths
|
0.2.powershell.exe.219bbb6b348.9.raw.unpack | infostealer_win_stormkitty | Finds StormKitty samples (or their variants) based on specific strings | Sekoia.io | - 0x5db:$sk01: LimerBoy/StormKitty
- 0x2fe013:$sk01: LimerBoy/StormKitty
- 0x252952:$str01: set_sUsername
- 0x55038a:$str01: set_sUsername
- 0x25fe84:$str03: set_sExpMonth
- 0x55d8bc:$str03: set_sExpMonth
- 0x27523f:$str04: WritePasswords
- 0x572c77:$str04: WritePasswords
- 0x275cf9:$str05: WriteCookies
- 0x573731:$str05: WriteCookies
- 0x279448:$str06: sChromiumPswPaths
- 0x576e80:$str06: sChromiumPswPaths
- 0x279423:$str07: sGeckoBrowserPaths
- 0x576e5b:$str07: sGeckoBrowserPaths
- 0x28eacf:$str10: encrypted_key":"(.*?)"
- 0x58c507:$str10: encrypted_key":"(.*?)"
|
0.2.powershell.exe.219bbb6b348.9.raw.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x28fa42:$str02: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
- 0x58d47a:$str02: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
- 0x28bb12:$str04: Pac_ket
- 0x58954a:$str04: Pac_ket
- 0x29b830:$str05: Perfor_mance
- 0x599268:$str05: Perfor_mance
- 0x29b874:$str06: Install_ed
- 0x5992ac:$str06: Install_ed
- 0x245f05:$str07: get_IsConnected
- 0x54393d:$str07: get_IsConnected
- 0x25c3ca:$str08: get_ActivatePo_ng
- 0x559e02:$str08: get_ActivatePo_ng
- 0x270305:$str09: isVM_by_wim_temper
- 0x56dd3d:$str09: isVM_by_wim_temper
- 0x29c122:$str10: save_Plugin
- 0x599b5a:$str10: save_Plugin
- 0x28c232:$str11: timeout 3 > NUL
- 0x589c6a:$str11: timeout 3 > NUL
- 0x29b410:$str12: ProcessHacker.exe
- 0x598e48:$str12: ProcessHacker.exe
- 0x29b602:$str13: Select * from Win32_CacheMemory
|
0.2.powershell.exe.219bbb6b348.9.raw.unpack | INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen | - 0x28fa42:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
- 0x58d47a:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
- 0x28f9a5:$s2: L2Mgc2NodGFza3MgL2
- 0x58d3dd:$s2: L2Mgc2NodGFza3MgL2
|
0.2.powershell.exe.219bbb6b348.9.raw.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x29b602:$q1: Select * from Win32_CacheMemory
- 0x59903a:$q1: Select * from Win32_CacheMemory
- 0x29b642:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x59907a:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x29b690:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x5990c8:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x29b6de:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
- 0x599116:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
0.2.powershell.exe.219bbb6b348.9.raw.unpack | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x293806:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
- 0x59123e:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
0.2.powershell.exe.219bbb6b348.9.raw.unpack | INDICATOR_SUSPICIOUS_EXE_References_VPN | Detects executables referencing many VPN software clients. Observed in infosteslers | ditekSHen | - 0x2991a1:$s1: \VPN\NordVPN
- 0x596bd9:$s1: \VPN\NordVPN
- 0x299187:$s2: \VPN\OpenVPN
- 0x596bbf:$s2: \VPN\OpenVPN
- 0x299169:$s3: \VPN\ProtonVPN
- 0x596ba1:$s3: \VPN\ProtonVPN
|
0.2.powershell.exe.219bbb6b348.9.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x28deeb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x58b923:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x28df5d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x58b995:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x28dfe7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x58ba1f:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x28e079:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x58bab1:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x28e0e3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x58bb1b:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x28e155:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x58bb8d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x28e1eb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x58bc23:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x28e27b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x58bcb3:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.powershell.exe.219bbb6b348.9.raw.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0x5c8:$x2: https://github.com/LimerBoy/StormKitty
- 0x2fe000:$x2: https://github.com/LimerBoy/StormKitty
- 0x5e4:$x3: StormKitty
- 0x2fe01c:$x3: StormKitty
- 0x27dff4:$s2: GetAntivirus
- 0x57ba2c:$s2: GetAntivirus
- 0x29405a:$s4: ^([a-zA-Z0-9_\-\.]+)@([a-zA-Z0-9_\-\.]+)\.([a-zA-Z]{2,5})$
- 0x591a92:$s4: ^([a-zA-Z0-9_\-\.]+)@([a-zA-Z0-9_\-\.]+)\.([a-zA-Z]{2,5})$
- 0x28d4a5:$s5: BCrypt.BCryptGetProperty() (get size) failed with status code:{0}
- 0x58aedd:$s5: BCrypt.BCryptGetProperty() (get size) failed with status code:{0}
- 0x28eacd:$s6: "encrypted_key":"(.*?)"
- 0x58c505:$s6: "encrypted_key":"(.*?)"
|
0.2.powershell.exe.219bbb6b348.9.raw.unpack | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x28baa2:$s3: {{ ProcessId = {0}, Name = {1}, ExecutablePath = {2} }}
- 0x5894da:$s3: {{ ProcessId = {0}, Name = {1}, ExecutablePath = {2} }}
- 0x287c16:$s6: VirtualBox
- 0x297795:$s6: VirtualBox
- 0x58564e:$s6: VirtualBox
- 0x5951cd:$s6: VirtualBox
- 0x2931b2:$s8: Win32_ComputerSystem
- 0x2976fb:$s8: Win32_ComputerSystem
- 0x590bea:$s8: Win32_ComputerSystem
- 0x595133:$s8: Win32_ComputerSystem
- 0x2902de:$s9: Win32_Process Where ParentProcessID=
- 0x58dd16:$s9: Win32_Process Where ParentProcessID=
- 0x28fefb:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x58d933:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x28ff98:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x58d9d0:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x2900ad:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x58dae5:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x290195:$cnc4: POST / HTTP/1.1
- 0x58dbcd:$cnc4: POST / HTTP/1.1
|
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | JoeSecurity_VenomRAT | Yara detected VenomRAT | Joe Security | |
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | JoeSecurity_BrowserPasswordDump_1 | Yara detected BrowserPasswordDump | Joe Security | |
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | JoeSecurity_Keylogger_Generic_3 | Yara detected Keylogger Generic | Joe Security | |
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | Windows_Trojan_DCRat_1aeea1ac | unknown | unknown | - 0x11d67e:$a1: havecamera
- 0x41b0b6:$a1: havecamera
- 0x1684a8:$a2: timeout 3 > NUL
- 0x465ee0:$a2: timeout 3 > NUL
- 0x16b82b:$a3: START "" "
- 0x16bd40:$a3: START "" "
- 0x469263:$a3: START "" "
- 0x469778:$a3: START "" "
- 0x16bc1b:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
- 0x469653:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
- 0x16bcb8:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
- 0x4696f0:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
|
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | infostealer_win_stealerium | Detects Stealerium based on specific strings | Sekoia.io | - 0x16eba2:$str01: Processe:
- 0x46c5da:$str01: Processe:
- 0x16ea5e:$str02: Compname:
- 0x46c496:$str02: Compname:
- 0x16eb58:$str04: SandBoxie:
- 0x46c590:$str04: SandBoxie:
- 0x16eaee:$str08: WEBCAMS COUNT:
- 0x46c526:$str08: WEBCAMS COUNT:
- 0x16eb12:$str09: [Virtualization]
- 0x46c54a:$str09: [Virtualization]
- 0x16f360:$str10: [Open google maps](
- 0x46cd98:$str10: [Open google maps](
- 0x170dd7:$str11: Remember password:
- 0x46e80f:$str11: Remember password:
- 0x163eca:$str12: Target.Browsers.Firefox
- 0x461902:$str12: Target.Browsers.Firefox
- 0x14b645:$str13: Modules.Keylogger
- 0x44907d:$str13: Modules.Keylogger
- 0x153508:$str14: ClipperAddresses
- 0x450f40:$str14: ClipperAddresses
- 0x1556ad:$str15: ChromiumPswPaths
|
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | infostealer_win_stormkitty | Finds StormKitty samples (or their variants) based on specific strings | Sekoia.io | - 0x1da289:$sk01: LimerBoy/StormKitty
- 0x12ebc8:$str01: set_sUsername
- 0x42c600:$str01: set_sUsername
- 0x13c0fa:$str03: set_sExpMonth
- 0x439b32:$str03: set_sExpMonth
- 0x1514b5:$str04: WritePasswords
- 0x44eeed:$str04: WritePasswords
- 0x151f6f:$str05: WriteCookies
- 0x44f9a7:$str05: WriteCookies
- 0x1556be:$str06: sChromiumPswPaths
- 0x4530f6:$str06: sChromiumPswPaths
- 0x155699:$str07: sGeckoBrowserPaths
- 0x4530d1:$str07: sGeckoBrowserPaths
- 0x16ad45:$str10: encrypted_key":"(.*?)"
- 0x46877d:$str10: encrypted_key":"(.*?)"
|
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x16bcb8:$str02: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
- 0x4696f0:$str02: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
- 0x167d88:$str04: Pac_ket
- 0x4657c0:$str04: Pac_ket
- 0x177aa6:$str05: Perfor_mance
- 0x4754de:$str05: Perfor_mance
- 0x177aea:$str06: Install_ed
- 0x475522:$str06: Install_ed
- 0x12217b:$str07: get_IsConnected
- 0x41fbb3:$str07: get_IsConnected
- 0x138640:$str08: get_ActivatePo_ng
- 0x436078:$str08: get_ActivatePo_ng
- 0x14c57b:$str09: isVM_by_wim_temper
- 0x449fb3:$str09: isVM_by_wim_temper
- 0x178398:$str10: save_Plugin
- 0x475dd0:$str10: save_Plugin
- 0x1684a8:$str11: timeout 3 > NUL
- 0x465ee0:$str11: timeout 3 > NUL
- 0x177686:$str12: ProcessHacker.exe
- 0x4750be:$str12: ProcessHacker.exe
- 0x177878:$str13: Select * from Win32_CacheMemory
|
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen | - 0x16bcb8:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
- 0x4696f0:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
- 0x16bc1b:$s2: L2Mgc2NodGFza3MgL2
- 0x469653:$s2: L2Mgc2NodGFza3MgL2
|
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x177878:$q1: Select * from Win32_CacheMemory
- 0x4752b0:$q1: Select * from Win32_CacheMemory
- 0x1778b8:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x4752f0:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x177906:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x47533e:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x177954:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
- 0x47538c:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x16fa7c:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
- 0x46d4b4:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | INDICATOR_SUSPICIOUS_EXE_References_VPN | Detects executables referencing many VPN software clients. Observed in infosteslers | ditekSHen | - 0x175417:$s1: \VPN\NordVPN
- 0x472e4f:$s1: \VPN\NordVPN
- 0x1753fd:$s2: \VPN\OpenVPN
- 0x472e35:$s2: \VPN\OpenVPN
- 0x1753df:$s3: \VPN\ProtonVPN
- 0x472e17:$s3: \VPN\ProtonVPN
|
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x16a161:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x467b99:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x16a1d3:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x467c0b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x16a25d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x467c95:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x16a2ef:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x467d27:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x16a359:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x467d91:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x16a3cb:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x467e03:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x16a461:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x467e99:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x16a4f1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x467f29:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | MALWARE_Win_StormKitty | Detects StormKitty infostealer | ditekSHen | - 0x1da276:$x2: https://github.com/LimerBoy/StormKitty
- 0x1da292:$x3: StormKitty
- 0x15a26a:$s2: GetAntivirus
- 0x457ca2:$s2: GetAntivirus
- 0x1702d0:$s4: ^([a-zA-Z0-9_\-\.]+)@([a-zA-Z0-9_\-\.]+)\.([a-zA-Z]{2,5})$
- 0x46dd08:$s4: ^([a-zA-Z0-9_\-\.]+)@([a-zA-Z0-9_\-\.]+)\.([a-zA-Z]{2,5})$
- 0x16971b:$s5: BCrypt.BCryptGetProperty() (get size) failed with status code:{0}
- 0x467153:$s5: BCrypt.BCryptGetProperty() (get size) failed with status code:{0}
- 0x16ad43:$s6: "encrypted_key":"(.*?)"
- 0x46877b:$s6: "encrypted_key":"(.*?)"
|
0.2.powershell.exe.219bbc8f0d2.10.raw.unpack | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x167d18:$s3: {{ ProcessId = {0}, Name = {1}, ExecutablePath = {2} }}
- 0x465750:$s3: {{ ProcessId = {0}, Name = {1}, ExecutablePath = {2} }}
- 0x163e8c:$s6: VirtualBox
- 0x173a0b:$s6: VirtualBox
- 0x4618c4:$s6: VirtualBox
- 0x471443:$s6: VirtualBox
- 0x16f428:$s8: Win32_ComputerSystem
- 0x173971:$s8: Win32_ComputerSystem
- 0x46ce60:$s8: Win32_ComputerSystem
- 0x4713a9:$s8: Win32_ComputerSystem
- 0x16c554:$s9: Win32_Process Where ParentProcessID=
- 0x469f8c:$s9: Win32_Process Where ParentProcessID=
- 0x16c171:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x469ba9:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x16c20e:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x469c46:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x16c323:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x469d5b:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x16c40b:$cnc4: POST / HTTP/1.1
- 0x469e43:$cnc4: POST / HTTP/1.1
|
Click to see the 116 entries |