General

  • Target

    456c0f28c52578f27a0859bde7cd01543bbacb94295d195b440a097a000f1ced

  • Size

    1.2MB

  • Sample

    240818-hn1cma1fpd

  • MD5

    716f68698217c9112d1b2ec962837ab3

  • SHA1

    d667d2b2191792231bbb99ebb3b7cdc0e1753be2

  • SHA256

    456c0f28c52578f27a0859bde7cd01543bbacb94295d195b440a097a000f1ced

  • SHA512

    caee0cfe43d8497a86e07911f210567bab8d6a871609ceafa11ed73c37bcec2413cfa549787d5cc1ccfe288b08cca9adf8c182f758638e66d04ebc6f00a4f6e8

  • SSDEEP

    24576:QtzhXvW/gzWQGDEqBUl6KvPN6zHdK4aYX2ef5xr/qpnFWX/yI:UzFvW/UWNDPUl6KHN6vadeDi0J

Malware Config

Targets

    • Target

      9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe

    • Size

      1.5MB

    • MD5

      ff83471ce09ebbe0da07d3001644b23c

    • SHA1

      672aa37f23b421e4afba46218735425f7acc29c2

    • SHA256

      9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba

    • SHA512

      179c724558065de4b7ea11dd75588df51a3fce737db3ebc77c8fdc0b3a432f6f1fdcc5acd2e2706ab0f088c35a3310c9e638de92ce0a644322eae46729aea259

    • SSDEEP

      24576:nK7tMGUfQtpOdk3xWBq0qWH6JubmMTzfZwLDC4pZylqUAc2:JQ7AkiqQaJjMHWvlpOqUt2

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks