General
-
Target
XBinderOutput.exe
-
Size
498KB
-
Sample
240819-m32lfstdpk
-
MD5
2c8cf21a477d6bfa16bf2e60125f4b93
-
SHA1
cc7792f9f8fd2b6508437f5ff3f667cc71893bd8
-
SHA256
20c29406f1b8fbbdff8528feaf19df7be1ace4da2ac3e9c1e34b710667cf7ee7
-
SHA512
0b5ef6e9a9737357c26840b1b0cfa7b7c4ff706402d40943a5992e2b3049393d8dd20962c4a5e944b349e7e8de0287f56f81cbd3e5dd7b1e630de5f6d3bdcb69
-
SSDEEP
12288:vM/2474xjEoCVoe3ieEm7MyuSANU22+zPp7QroGhhZL:0O2OU6e3ieEm7M72+9yosl
Static task
static1
Behavioral task
behavioral1
Sample
XBinderOutput.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
XBinderOutput.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
XBinderOutput.exe
-
Size
498KB
-
MD5
2c8cf21a477d6bfa16bf2e60125f4b93
-
SHA1
cc7792f9f8fd2b6508437f5ff3f667cc71893bd8
-
SHA256
20c29406f1b8fbbdff8528feaf19df7be1ace4da2ac3e9c1e34b710667cf7ee7
-
SHA512
0b5ef6e9a9737357c26840b1b0cfa7b7c4ff706402d40943a5992e2b3049393d8dd20962c4a5e944b349e7e8de0287f56f81cbd3e5dd7b1e630de5f6d3bdcb69
-
SSDEEP
12288:vM/2474xjEoCVoe3ieEm7MyuSANU22+zPp7QroGhhZL:0O2OU6e3ieEm7M72+9yosl
Score10/10-
StormKitty payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-