General
-
Target
IpCam Bruter.exe
-
Size
143KB
-
Sample
240823-nbyads1aje
-
MD5
ff94c762dc8bda27e4e75c4285ab89fa
-
SHA1
897b8c1939ce10abf5b5b5cbc71883adb8715afe
-
SHA256
10c0d4921910751c17d1ab6c74e48a3c9d5be28aa55b80762418765dcdcbe06c
-
SHA512
6df88282d7898a9123459cab326881521e6ad4f39ddf8c5dbb95c0cb5635521673a1a4ada47f4f68fdb948f384912a718bb8f7cf712b5c25377493e0dba26707
-
SSDEEP
3072:d3YO5kKdXl0ZRBL/Tuny9bdcGZcKRWpgep82z:JYO4RBTTgy9bCdX
Behavioral task
behavioral1
Sample
IpCam Bruter.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
IpCam Bruter.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
IpCam Bruter.exe
-
Size
143KB
-
MD5
ff94c762dc8bda27e4e75c4285ab89fa
-
SHA1
897b8c1939ce10abf5b5b5cbc71883adb8715afe
-
SHA256
10c0d4921910751c17d1ab6c74e48a3c9d5be28aa55b80762418765dcdcbe06c
-
SHA512
6df88282d7898a9123459cab326881521e6ad4f39ddf8c5dbb95c0cb5635521673a1a4ada47f4f68fdb948f384912a718bb8f7cf712b5c25377493e0dba26707
-
SSDEEP
3072:d3YO5kKdXl0ZRBL/Tuny9bdcGZcKRWpgep82z:JYO4RBTTgy9bCdX
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1