General

  • Target

    NorthSperm.exe

  • Size

    1.5MB

  • Sample

    240829-p9j14asfqg

  • MD5

    ff83471ce09ebbe0da07d3001644b23c

  • SHA1

    672aa37f23b421e4afba46218735425f7acc29c2

  • SHA256

    9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba

  • SHA512

    179c724558065de4b7ea11dd75588df51a3fce737db3ebc77c8fdc0b3a432f6f1fdcc5acd2e2706ab0f088c35a3310c9e638de92ce0a644322eae46729aea259

  • SSDEEP

    24576:nK7tMGUfQtpOdk3xWBq0qWH6JubmMTzfZwLDC4pZylqUAc2:JQ7AkiqQaJjMHWvlpOqUt2

Malware Config

Targets

    • Target

      NorthSperm.exe

    • Size

      1.5MB

    • MD5

      ff83471ce09ebbe0da07d3001644b23c

    • SHA1

      672aa37f23b421e4afba46218735425f7acc29c2

    • SHA256

      9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba

    • SHA512

      179c724558065de4b7ea11dd75588df51a3fce737db3ebc77c8fdc0b3a432f6f1fdcc5acd2e2706ab0f088c35a3310c9e638de92ce0a644322eae46729aea259

    • SSDEEP

      24576:nK7tMGUfQtpOdk3xWBq0qWH6JubmMTzfZwLDC4pZylqUAc2:JQ7AkiqQaJjMHWvlpOqUt2

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks