Overview
overview
10Static
static
10appconsole.exe
windows7_x64
10appconsole.exe
windows10-2004_x64
10azorult.exe
windows7_x64
10azorult.exe
windows10-2004_x64
10clipper.exe
windows7_x64
1clipper.exe
windows10-2004_x64
1jester_stealer.exe
windows7_x64
10jester_stealer.exe
windows10-2004_x64
10lokibot.exe
windows7_x64
10lokibot.exe
windows10-2004_x64
10pony.exe
windows7_x64
10pony.exe
windows10-2004_x64
10raccoon.exe
windows7_x64
10raccoon.exe
windows10-2004_x64
10redline.exe
windows7_x64
10redline.exe
windows10-2004_x64
10tesla.exe
windows7_x64
10tesla.exe
windows10-2004_x64
10vidar.xll
windows7_x64
7vidar.xll
windows10-2004_x64
10Analysis
-
max time kernel
596s -
max time network
566s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
28-04-2022 07:35
Static task
static1
Behavioral task
behavioral1
Sample
appconsole.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
appconsole.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
azorult.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
azorult.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
clipper.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
clipper.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
jester_stealer.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
jester_stealer.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
lokibot.exe
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
lokibot.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
pony.exe
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
pony.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
raccoon.exe
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
raccoon.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
redline.exe
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
redline.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
tesla.exe
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
tesla.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
vidar.xll
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
vidar.xll
Resource
win10v2004-20220414-en
General
-
Target
appconsole.exe
-
Size
80KB
-
MD5
bbf6a17cc8d96f635840ae1d63223659
-
SHA1
b5675c4a47431bc9690e724228e1093f0a3a74f1
-
SHA256
cbcf13e1e93966e2d5d20a8e53ddd243546d5d531a0c50e840df505640e0c603
-
SHA512
e4e3a0054795d4cd9ace0c38644d119f302d0bf62cfc74a8e4765252c1443aab9ca4cc5de4eda64f47f6417c7fe3367a2f7010f286d90ee3c9fb23eb688bc228
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4708-130-0x000001F471750000-0x000001F47176A000-memory.dmp family_stormkitty -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 11 ip-api.com 5 api.ipify.org -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1728 4708 WerFault.exe appconsole.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
appconsole.exepid process 4708 appconsole.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
appconsole.exedescription pid process Token: SeDebugPrivilege 4708 appconsole.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\appconsole.exe"C:\Users\Admin\AppData\Local\Temp\appconsole.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4708 -s 19322⤵
- Program crash
PID:1728
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 184 -p 4708 -ip 47081⤵PID:4828