General
-
Target
build.exe
-
Size
6.7MB
-
Sample
241008-yy66xswakb
-
MD5
28ef4cb352cfe60d068b08f677f3689f
-
SHA1
1efb5e55b13e15ed534c711efee79c62e36c8eea
-
SHA256
60837ecb4271e7348591ab1d8ee69dabf9071677694fb024493497af43855f25
-
SHA512
ec16acce2053d91f835c31aa453a4415b281fc041e1d4a23fe90631bc2acaf6c9bf6531f0332e2cf954660ac01d0e3f031c64e74988e06bee0d332814acc639c
-
SSDEEP
98304:XStzEq9xypvogUuuhDYbkqKTU5QgFFgG6INdOzs:WnTY84QuuG6INys
Static task
static1
Behavioral task
behavioral1
Sample
build.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
build.exe
-
Size
6.7MB
-
MD5
28ef4cb352cfe60d068b08f677f3689f
-
SHA1
1efb5e55b13e15ed534c711efee79c62e36c8eea
-
SHA256
60837ecb4271e7348591ab1d8ee69dabf9071677694fb024493497af43855f25
-
SHA512
ec16acce2053d91f835c31aa453a4415b281fc041e1d4a23fe90631bc2acaf6c9bf6531f0332e2cf954660ac01d0e3f031c64e74988e06bee0d332814acc639c
-
SSDEEP
98304:XStzEq9xypvogUuuhDYbkqKTU5QgFFgG6INdOzs:WnTY84QuuG6INys
Score10/10-
StormKitty payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1