General

  • Target

    c177d70d7e3fd9c9499011cce57cc800

  • Size

    1.3MB

  • Sample

    240311-yqwefscg9z

  • MD5

    c177d70d7e3fd9c9499011cce57cc800

  • SHA1

    418e8e996d6e2e5e0d58a74276a771492b0e7283

  • SHA256

    9e1dd477999ef5e83ef7e238a8c1df3b1b618c1f5cc72a8a98dd4352b06267a5

  • SHA512

    2055b5f3ab4376c49f5ab055b09ced4c0bf4a484cd6aae94d1b6bbc9dfecc6e28c9d7c57f97ef64588bc9249e5c7cf25c24acbeb5cf5b02a8e44b022b00c7281

  • SSDEEP

    24576:1LF7NWgiaJrPJTLbGi777hcCwJ5sfeKuCdeMj65PJUSJ+QRZKiCoXvHUZC8ur8h9:NthjlpLbGCwJOfrn45prP/0Rur8hfl

Malware Config

Targets

    • Target

      c177d70d7e3fd9c9499011cce57cc800

    • Size

      1.3MB

    • MD5

      c177d70d7e3fd9c9499011cce57cc800

    • SHA1

      418e8e996d6e2e5e0d58a74276a771492b0e7283

    • SHA256

      9e1dd477999ef5e83ef7e238a8c1df3b1b618c1f5cc72a8a98dd4352b06267a5

    • SHA512

      2055b5f3ab4376c49f5ab055b09ced4c0bf4a484cd6aae94d1b6bbc9dfecc6e28c9d7c57f97ef64588bc9249e5c7cf25c24acbeb5cf5b02a8e44b022b00c7281

    • SSDEEP

      24576:1LF7NWgiaJrPJTLbGi777hcCwJ5sfeKuCdeMj65PJUSJ+QRZKiCoXvHUZC8ur8h9:NthjlpLbGCwJOfrn45prP/0Rur8hfl

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks