General

  • Target

    HEUR-Trojan-PSW.MSIL.Stealer.gen-302dd23d469643215e54a187e4127b50df5bbcdef4c5924193dc6815ba5c2e34

  • Size

    117KB

  • Sample

    240416-w35sjshc88

  • MD5

    4c4f07c6d9f0b73193ddd3406201e900

  • SHA1

    4786a21d01abbe48fbb0e3943aa43366200d8ef4

  • SHA256

    302dd23d469643215e54a187e4127b50df5bbcdef4c5924193dc6815ba5c2e34

  • SHA512

    dbc27b759dd275465027d0079d924ad203c2a09cf5e073c9134962a3c38ccd434798392c9218cec7ea532adccf70916fa69e866aa6425f3cd38f064cece645ae

  • SSDEEP

    3072:daOqc4zX7NtM0NN7Uj2D9bW0YBDrUbpODw4:rF4zX7NlYjg9ba

Score
10/10

Malware Config

Targets

    • Target

      HEUR-Trojan-PSW.MSIL.Stealer.gen-302dd23d469643215e54a187e4127b50df5bbcdef4c5924193dc6815ba5c2e34

    • Size

      117KB

    • MD5

      4c4f07c6d9f0b73193ddd3406201e900

    • SHA1

      4786a21d01abbe48fbb0e3943aa43366200d8ef4

    • SHA256

      302dd23d469643215e54a187e4127b50df5bbcdef4c5924193dc6815ba5c2e34

    • SHA512

      dbc27b759dd275465027d0079d924ad203c2a09cf5e073c9134962a3c38ccd434798392c9218cec7ea532adccf70916fa69e866aa6425f3cd38f064cece645ae

    • SSDEEP

      3072:daOqc4zX7NtM0NN7Uj2D9bW0YBDrUbpODw4:rF4zX7NlYjg9ba

    Score
    10/10
    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Tasks