General
-
Target
5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc
-
Size
297KB
-
Sample
240817-2nmajs1fmh
-
MD5
fb7bed457cb3d5be6c8b80f3105cc3d3
-
SHA1
0a60f5ca1e55b180ee0db151830c477d361aea3c
-
SHA256
5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc
-
SHA512
36d29cca7be2e416545273860e9a38d3df930d657bc39fba299dcee03138a52e5ca4292d4a5d3a4a3277582b24008c3edd225df341f81063b963ada438c7fd88
-
SSDEEP
6144:thiCNeUwAe6krgybO4Ef2z0Ysapo1y+S5ORiv:tTNeUwAr2hd0yZv
Behavioral task
behavioral1
Sample
5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc
-
Size
297KB
-
MD5
fb7bed457cb3d5be6c8b80f3105cc3d3
-
SHA1
0a60f5ca1e55b180ee0db151830c477d361aea3c
-
SHA256
5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc
-
SHA512
36d29cca7be2e416545273860e9a38d3df930d657bc39fba299dcee03138a52e5ca4292d4a5d3a4a3277582b24008c3edd225df341f81063b963ada438c7fd88
-
SSDEEP
6144:thiCNeUwAe6krgybO4Ef2z0Ysapo1y+S5ORiv:tTNeUwAr2hd0yZv
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2