General

  • Target

    add.exe

  • Size

    41KB

  • Sample

    241017-bref1avame

  • MD5

    b7afde8a62a07ff296a2710fe4b1dfd3

  • SHA1

    3f2a96a00029470a784a0ef2682c46ebbe7326d1

  • SHA256

    5fc540445527a02af8d14becec39d3b7283c2cb24ef4f547cab7aeb2ce5193ef

  • SHA512

    9dff009e74c2352b34159fc9bf8252c5508eb9a5fd4b1a298f4b179fc08e1a9327dd9c8acd67bc8e8ef4c0b0cd9cb00b2ad3f1eb670971ea16cefc721558dc0c

  • SSDEEP

    768:dk0KOhPmqwA4DmRsHoxfv9lJ0z1QB6SNEHvro25E:dqA4DmaSv941Qo0EH025E

Malware Config

Targets

    • Target

      add.exe

    • Size

      41KB

    • MD5

      b7afde8a62a07ff296a2710fe4b1dfd3

    • SHA1

      3f2a96a00029470a784a0ef2682c46ebbe7326d1

    • SHA256

      5fc540445527a02af8d14becec39d3b7283c2cb24ef4f547cab7aeb2ce5193ef

    • SHA512

      9dff009e74c2352b34159fc9bf8252c5508eb9a5fd4b1a298f4b179fc08e1a9327dd9c8acd67bc8e8ef4c0b0cd9cb00b2ad3f1eb670971ea16cefc721558dc0c

    • SSDEEP

      768:dk0KOhPmqwA4DmRsHoxfv9lJ0z1QB6SNEHvro25E:dqA4DmaSv941Qo0EH025E

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks