General

  • Target

    00909000870.exe

  • Size

    1.1MB

  • Sample

    210414-xnwlj7bdae

  • MD5

    b6d292139cbd769bfa7c005cbc3a8202

  • SHA1

    f12d48f3aa3a1910795a12fbc57b32d24145af73

  • SHA256

    6e3816fe96ae72f3c7695e1a64225ed36ff8a7e61f0fb192447cb14d5736dcea

  • SHA512

    3cde67951d45796bf76c7724db52cc2bf64d40cf55e5bb751c98a0028ea309549f0344f1c0e1adf32c384441a02507cbfbaf0476761bebc37f5816079472dc6a

Malware Config

Targets

    • Target

      00909000870.exe

    • Size

      1.1MB

    • MD5

      b6d292139cbd769bfa7c005cbc3a8202

    • SHA1

      f12d48f3aa3a1910795a12fbc57b32d24145af73

    • SHA256

      6e3816fe96ae72f3c7695e1a64225ed36ff8a7e61f0fb192447cb14d5736dcea

    • SHA512

      3cde67951d45796bf76c7724db52cc2bf64d40cf55e5bb751c98a0028ea309549f0344f1c0e1adf32c384441a02507cbfbaf0476761bebc37f5816079472dc6a

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty Payload

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks