General

  • Target

    c763939dbda892f1fdb4823ac6c776967c836ab4fb0c18e05abf0a107e50a1b7

  • Size

    8.6MB

  • Sample

    230129-t4xr8afc5z

  • MD5

    fb1f0a6fb2855b412d8bffd7933ff209

  • SHA1

    eda6cbcf44e80ac163c9e9a677f9fd2ccd433662

  • SHA256

    c763939dbda892f1fdb4823ac6c776967c836ab4fb0c18e05abf0a107e50a1b7

  • SHA512

    285d263173b06468923f366a0a635e0a6ab54152f931172f86eef6fe2c2a22902130341297b62464964a4d4c9d3ace3632cc95d736d0d4139dda89399b7b7f7f

  • SSDEEP

    196608:vE9Z7yTLLqrZI+/8lN2kaJMwOXq2EHxRIsYSSQ+xNW7es7/M:vU5yT3qrZIw8TaitELIs1T+xNvs7

Malware Config

Targets

    • Target

      c763939dbda892f1fdb4823ac6c776967c836ab4fb0c18e05abf0a107e50a1b7

    • Size

      8.6MB

    • MD5

      fb1f0a6fb2855b412d8bffd7933ff209

    • SHA1

      eda6cbcf44e80ac163c9e9a677f9fd2ccd433662

    • SHA256

      c763939dbda892f1fdb4823ac6c776967c836ab4fb0c18e05abf0a107e50a1b7

    • SHA512

      285d263173b06468923f366a0a635e0a6ab54152f931172f86eef6fe2c2a22902130341297b62464964a4d4c9d3ace3632cc95d736d0d4139dda89399b7b7f7f

    • SSDEEP

      196608:vE9Z7yTLLqrZI+/8lN2kaJMwOXq2EHxRIsYSSQ+xNW7es7/M:vU5yT3qrZIw8TaitELIs1T+xNvs7

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Security Software Discovery

1
T1063

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks