Overview
overview
10Static
static
10BlitzedGrabberV12.rar
windows7-x64
10BlitzedGrabberV12.rar
windows10-2004-x64
3BlitzedGra...12.exe
windows7-x64
10BlitzedGra...12.exe
windows10-2004-x64
10BlitzedGra...ME.txt
windows7-x64
1BlitzedGra...ME.txt
windows10-2004-x64
1BlitzedGra...OR.dll
windows7-x64
1BlitzedGra...OR.dll
windows10-2004-x64
1BlitzedGra...to.dll
windows7-x64
1BlitzedGra...to.dll
windows10-2004-x64
1BlitzedGra...on.dll
windows7-x64
1BlitzedGra...on.dll
windows10-2004-x64
1BlitzedGra...le.exe
windows7-x64
3BlitzedGra...le.exe
windows10-2004-x64
3BlitzedGra...ww.exe
windows7-x64
10BlitzedGra...ww.exe
windows10-2004-x64
10BlitzedGra...y5.exe
windows7-x64
10BlitzedGra...y5.exe
windows10-2004-x64
10Analysis
-
max time kernel
436s -
max time network
441s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 17:25
Behavioral task
behavioral1
Sample
BlitzedGrabberV12.rar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
BlitzedGrabberV12.rar
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
BlitzedGrabberV12/BlitzedGrabberV12.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
BlitzedGrabberV12/BlitzedGrabberV12.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
BlitzedGrabberV12/README.txt
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
BlitzedGrabberV12/README.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
BlitzedGrabberV12/Resources/APIFOR.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
BlitzedGrabberV12/Resources/APIFOR.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
BlitzedGrabberV12/Resources/BouncyCastle.Crypto.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
BlitzedGrabberV12/Resources/BouncyCastle.Crypto.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
BlitzedGrabberV12/Resources/Newtonsoft.Json.dll
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
BlitzedGrabberV12/Resources/Newtonsoft.Json.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
BlitzedGrabberV12/Resources/UltraEmbeddable.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
BlitzedGrabberV12/Resources/UltraEmbeddable.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
BlitzedGrabberV12/Resources/ww.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
BlitzedGrabberV12/Resources/ww.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
BlitzedGrabberV12/Resources/yhyty5.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
BlitzedGrabberV12/Resources/yhyty5.exe
Resource
win10v2004-20240426-en
General
-
Target
BlitzedGrabberV12/Resources/yhyty5.exe
-
Size
59KB
-
MD5
9b1283f4b90fa0009ea6fda13596a584
-
SHA1
1daa7ccfddc6da823c2fadb7b821a9e26efebabe
-
SHA256
4e3ff2595fc8b32fb44856e856b6d91600fd6a66ab556bc2437a926bf7c8fdb0
-
SHA512
ca6d46254da5c16f80a3ee4a5d11b7203a025082e8268ba8ff343a6b705262e03c8c149e381ec038b364ebecb8a5ab4169e6e5fb3676d90abe37aecf468d1ecb
-
SSDEEP
768:uvlq4ltFkHOCROyDZSCY6LaIdB4b2iuAPGdX3oI0fZOv11cEL6N9Q5WEpGl:I84l4XROyDL3AEo41BLg9Qg6y
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral18/memory/2140-0-0x0000000000250000-0x0000000000266000-memory.dmp family_stormkitty -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 21 discord.com 13 discord.com 14 discord.com 18 discord.com 20 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2140 yhyty5.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1320 2140 yhyty5.exe 85 PID 2140 wrote to memory of 1320 2140 yhyty5.exe 85 PID 1320 wrote to memory of 2960 1320 cmd.exe 87 PID 1320 wrote to memory of 2960 1320 cmd.exe 87 PID 1320 wrote to memory of 1012 1320 cmd.exe 88 PID 1320 wrote to memory of 1012 1320 cmd.exe 88 PID 1320 wrote to memory of 2544 1320 cmd.exe 89 PID 1320 wrote to memory of 2544 1320 cmd.exe 89 PID 2140 wrote to memory of 4000 2140 yhyty5.exe 90 PID 2140 wrote to memory of 4000 2140 yhyty5.exe 90 PID 4000 wrote to memory of 3140 4000 cmd.exe 94 PID 4000 wrote to memory of 3140 4000 cmd.exe 94 PID 4000 wrote to memory of 4596 4000 cmd.exe 95 PID 4000 wrote to memory of 4596 4000 cmd.exe 95 PID 4000 wrote to memory of 2100 4000 cmd.exe 96 PID 4000 wrote to memory of 2100 4000 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12\Resources\yhyty5.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12\Resources\yhyty5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2960
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵PID:1012
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:2544
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name=65001 key=clear | findstr Key2⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3140
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile name=65001 key=clear3⤵PID:4596
-
-
C:\Windows\system32\findstr.exefindstr Key3⤵PID:2100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD568b329da9893e34099c7d8ad5cb9c940
SHA1adc83b19e793491b1c6ea0fd8b46cd9f32e592fc
SHA25601ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
SHA512be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09