General

  • Target

    tester.exe

  • Size

    45KB

  • Sample

    240922-epjvgs1dmq

  • MD5

    307f44b3aa4b6b84570d609aad9bed2d

  • SHA1

    85530a7da34e63db54027b5c632a59eb926cfab9

  • SHA256

    1778b2a4eedd366d7f71bb5a2e2a6cd8dbf0691f291efc3020dd13cc9d1ab393

  • SHA512

    0bbce563f1d74eb28c239ff4e972309362f8b385312162d7896eead21fd0d2426ddda84c8539ee951bcb1953613e16a197e89ff574542c51da6aac2e35ef9e6a

  • SSDEEP

    768:HbUAM7L77H9Xxz0Qk97RHrnS9RULQ89PKfn1z1QB6S6pQvrM/bU:HbUAM7LPLzjIRr6Gs89W1QoFpQo/bU

Malware Config

Targets

    • Target

      tester.exe

    • Size

      45KB

    • MD5

      307f44b3aa4b6b84570d609aad9bed2d

    • SHA1

      85530a7da34e63db54027b5c632a59eb926cfab9

    • SHA256

      1778b2a4eedd366d7f71bb5a2e2a6cd8dbf0691f291efc3020dd13cc9d1ab393

    • SHA512

      0bbce563f1d74eb28c239ff4e972309362f8b385312162d7896eead21fd0d2426ddda84c8539ee951bcb1953613e16a197e89ff574542c51da6aac2e35ef9e6a

    • SSDEEP

      768:HbUAM7L77H9Xxz0Qk97RHrnS9RULQ89PKfn1z1QB6S6pQvrM/bU:HbUAM7LPLzjIRr6Gs89W1QoFpQo/bU

    • Modifies visibility of file extensions in Explorer

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks