Analysis
-
max time kernel
75s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 08:08
Behavioral task
behavioral1
Sample
cd78403a8eba164154f93b0a5f89c168728af5827dfbfacfa2cc0d7ab06f94efN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cd78403a8eba164154f93b0a5f89c168728af5827dfbfacfa2cc0d7ab06f94efN.exe
Resource
win10v2004-20241007-en
General
-
Target
cd78403a8eba164154f93b0a5f89c168728af5827dfbfacfa2cc0d7ab06f94efN.exe
-
Size
1.1MB
-
MD5
baa9e965a45f11afea37db79c1c7f2b0
-
SHA1
32f30ff260ddb11d6c5c04bcdb40f253663837f3
-
SHA256
cd78403a8eba164154f93b0a5f89c168728af5827dfbfacfa2cc0d7ab06f94ef
-
SHA512
0fabf43228c82d1b00a0b27384f556d0e3917fa1a015685bcd49e89139e98f85ba6b52ac655c468a13768caca71b6b9da03718cf63950152b2bb2ad8f8d30e68
-
SSDEEP
24576:CUSNXaV9x4IUgs36BUI2So5+jnzFoCaGApu8:C90T+Sk6BU7HIFo7G98
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2456-1-0x0000000000D30000-0x0000000000E4C000-memory.dmp family_stormkitty -
Stormkitty family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 7 discord.com 8 discord.com 9 discord.com 10 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2456 cd78403a8eba164154f93b0a5f89c168728af5827dfbfacfa2cc0d7ab06f94efN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD568b329da9893e34099c7d8ad5cb9c940
SHA1adc83b19e793491b1c6ea0fd8b46cd9f32e592fc
SHA25601ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
SHA512be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09