General

  • Target

    Vynx-Hypixel-Skyblock-Minecraft-.jar-rat-builder-main.zip

  • Size

    1.1MB

  • Sample

    240801-meqt2szfjd

  • MD5

    2a4496aeed2914eae31cce288b11847c

  • SHA1

    160fba1660cfa2f0e2c393bbccbfac7f6b0b9faf

  • SHA256

    b7a9641adf705c3d7eb6bc10827819bc47ac1bbefb3831c0050d633090a46b45

  • SHA512

    da40e33452a6707ba120c3193ec32461db769f6cb90da038867f6649850c202833af668535509d0ef7d6997b43f1c06fa35c9b70ed8fa28aeff5803c16bad370

  • SSDEEP

    24576:5LwEtVmuX794xtKpY8APE4Yv10D17RfC6c5Zy8DGL:5/tIuLSrY3A8ldMdRfR6I8DGL

Malware Config

Targets

    • Target

      Vynx-Hypixel-Skyblock-Minecraft-.jar-rat-builder-main/VynxRatBuilderV1/Vynx.exe

    • Size

      1.5MB

    • MD5

      4586542b09bc8e8f7165ad1a1c8ca340

    • SHA1

      c05a77a93d124b81c98b0af5a8b3a22c345cb113

    • SHA256

      b5305d8ffa960b6b7988cc51c35e4af3aa87cd0a03eb68c49eb862142506ca5a

    • SHA512

      62454140b73edec586113620265ef76da6e220c24632c2ec7d53abd41180170ab811f796321578f2260d3b0906c2da3bde63d9580b0a88c6eb1c6bdc6dbf5c13

    • SSDEEP

      24576:47zNXaV9x4IUgs36BUI2So5+jnzFoCaGApu8p:4f0T+Sk6BU7HIFo7G98

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks