General
-
Target
cb41a8b4efce6ec7fe93a6878964c4492a814b03e9edb0e434d8f510dac4b2d6N
-
Size
1.6MB
-
Sample
241104-q13mhstjbq
-
MD5
3420f30a64bec629d676254a475823f0
-
SHA1
26722aa62e36e90daee1f1ef2f8b754584aba419
-
SHA256
cb41a8b4efce6ec7fe93a6878964c4492a814b03e9edb0e434d8f510dac4b2d6
-
SHA512
4b167f5e5bccbfdf7b708dbd3545c4d52d8b751a0658a0232be114a355ab52e33d426708d9098dd85c1393188ea3e241fd01b6cae71a32e65f8821bb26ce88ef
-
SSDEEP
49152:KAXCw7uq6e14Y18bVeKTAknS/G/ZT9JlPebr/Imnf4bacz:KAyJqL5ceKpuULlMr/Fn7O
Static task
static1
Behavioral task
behavioral1
Sample
cb41a8b4efce6ec7fe93a6878964c4492a814b03e9edb0e434d8f510dac4b2d6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb41a8b4efce6ec7fe93a6878964c4492a814b03e9edb0e434d8f510dac4b2d6N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
cb41a8b4efce6ec7fe93a6878964c4492a814b03e9edb0e434d8f510dac4b2d6N
-
Size
1.6MB
-
MD5
3420f30a64bec629d676254a475823f0
-
SHA1
26722aa62e36e90daee1f1ef2f8b754584aba419
-
SHA256
cb41a8b4efce6ec7fe93a6878964c4492a814b03e9edb0e434d8f510dac4b2d6
-
SHA512
4b167f5e5bccbfdf7b708dbd3545c4d52d8b751a0658a0232be114a355ab52e33d426708d9098dd85c1393188ea3e241fd01b6cae71a32e65f8821bb26ce88ef
-
SSDEEP
49152:KAXCw7uq6e14Y18bVeKTAknS/G/ZT9JlPebr/Imnf4bacz:KAyJqL5ceKpuULlMr/Fn7O
-
StormKitty payload
-
Stormkitty family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2