General

  • Target

    XBinderOutput.exe

  • Size

    498KB

  • Sample

    240819-m32lfstdpk

  • MD5

    2c8cf21a477d6bfa16bf2e60125f4b93

  • SHA1

    cc7792f9f8fd2b6508437f5ff3f667cc71893bd8

  • SHA256

    20c29406f1b8fbbdff8528feaf19df7be1ace4da2ac3e9c1e34b710667cf7ee7

  • SHA512

    0b5ef6e9a9737357c26840b1b0cfa7b7c4ff706402d40943a5992e2b3049393d8dd20962c4a5e944b349e7e8de0287f56f81cbd3e5dd7b1e630de5f6d3bdcb69

  • SSDEEP

    12288:vM/2474xjEoCVoe3ieEm7MyuSANU22+zPp7QroGhhZL:0O2OU6e3ieEm7M72+9yosl

Malware Config

Targets

    • Target

      XBinderOutput.exe

    • Size

      498KB

    • MD5

      2c8cf21a477d6bfa16bf2e60125f4b93

    • SHA1

      cc7792f9f8fd2b6508437f5ff3f667cc71893bd8

    • SHA256

      20c29406f1b8fbbdff8528feaf19df7be1ace4da2ac3e9c1e34b710667cf7ee7

    • SHA512

      0b5ef6e9a9737357c26840b1b0cfa7b7c4ff706402d40943a5992e2b3049393d8dd20962c4a5e944b349e7e8de0287f56f81cbd3e5dd7b1e630de5f6d3bdcb69

    • SSDEEP

      12288:vM/2474xjEoCVoe3ieEm7MyuSANU22+zPp7QroGhhZL:0O2OU6e3ieEm7M72+9yosl

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks