General

  • Target

    017c86f8f1607d55e270cdd1cce5864c.exe

  • Size

    309KB

  • Sample

    210109-7wrstgb9lj

  • MD5

    017c86f8f1607d55e270cdd1cce5864c

  • SHA1

    17d42408e24effdb365e59105f5ba080ad98c609

  • SHA256

    27b55c8a94eb835f7ef194183f088415ac4e75348609465a1393043ab6161631

  • SHA512

    1e0a9b8c21a7d0e91ee62d3111fd6b05d523fb48eb7ec94544202c9f6942ff6db358d25737304dec13368e4dd79fb3a9a37f499a925377ec7cd035e1f71d3b91

Malware Config

Targets

    • Target

      017c86f8f1607d55e270cdd1cce5864c.exe

    • Size

      309KB

    • MD5

      017c86f8f1607d55e270cdd1cce5864c

    • SHA1

      17d42408e24effdb365e59105f5ba080ad98c609

    • SHA256

      27b55c8a94eb835f7ef194183f088415ac4e75348609465a1393043ab6161631

    • SHA512

      1e0a9b8c21a7d0e91ee62d3111fd6b05d523fb48eb7ec94544202c9f6942ff6db358d25737304dec13368e4dd79fb3a9a37f499a925377ec7cd035e1f71d3b91

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty Payload

    • Downloads MZ/PE file

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks