General

  • Target

    PussyKiller.exe

  • Size

    74KB

  • Sample

    240804-1dqdsawhmm

  • MD5

    7acd7ca811c678a92d62d556cae858dc

  • SHA1

    b05d0fd47d2d905234db53614f725e3744c93b3e

  • SHA256

    736f8b467d09e4805d336c56b49ec183355dc433e04b93904d2e8d5876d5b9de

  • SHA512

    24fe70950fc092d9de383f5c80c70bdc4bd5e342b927e2fb495752e0036c3d2eb0547f60467ef5019a686fffd2f8057105d13dd566172f9438ffe4434748166b

  • SSDEEP

    1536:rNtW7bvrmSbUMiuidaw6v3ZfXR6/A8Id0FWGV09auvIUxjFxtbm:rzTyXRKA8Iwg9auvIUhFxty

Malware Config

Targets

    • Target

      PussyKiller.exe

    • Size

      74KB

    • MD5

      7acd7ca811c678a92d62d556cae858dc

    • SHA1

      b05d0fd47d2d905234db53614f725e3744c93b3e

    • SHA256

      736f8b467d09e4805d336c56b49ec183355dc433e04b93904d2e8d5876d5b9de

    • SHA512

      24fe70950fc092d9de383f5c80c70bdc4bd5e342b927e2fb495752e0036c3d2eb0547f60467ef5019a686fffd2f8057105d13dd566172f9438ffe4434748166b

    • SSDEEP

      1536:rNtW7bvrmSbUMiuidaw6v3ZfXR6/A8Id0FWGV09auvIUxjFxtbm:rzTyXRKA8Iwg9auvIUhFxty

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks