Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 14:54
Behavioral task
behavioral1
Sample
rdp_stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rdp_stealer.exe
Resource
win10v2004-20241007-en
General
-
Target
rdp_stealer.exe
-
Size
320KB
-
MD5
aed949c2645ab1e4671d9cbb6306c063
-
SHA1
a2cd06f61a2d220b81f62ca62ebe6df3246e6837
-
SHA256
1f5d9a0d8947fe2761530a5e024fcb655b04cbd57bad826d45956153f74938cf
-
SHA512
a23794c977667fb59d73ff9781d7262b1f02419bae3094717df0e5ff1ac194cd3e74d8badbd58899f5d03face7944becf7e517f3d82cd24b0f545e4a7b7ef3cd
-
SSDEEP
6144:3m/Q1Q5Ng68j/svmHC40+XIzFUygWK0tWrcBOvx:3m/Q6P8j/svm1TXI5tZB
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/3440-1-0x00000000000E0000-0x0000000000136000-memory.dmp family_stormkitty -
Stormkitty family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rdp_stealer.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rdp_stealer.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rdp_stealer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\GYHASOLS\FileGrabber\Documents\desktop.ini rdp_stealer.exe File created C:\Users\Admin\AppData\Roaming\GYHASOLS\FileGrabber\Downloads\desktop.ini rdp_stealer.exe File created C:\Users\Admin\AppData\Roaming\GYHASOLS\FileGrabber\Desktop\desktop.ini rdp_stealer.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 api.ipify.org 36 ip-api.com 3 freegeoip.app 6 freegeoip.app 34 api.ipify.org -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdp_stealer.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 rdp_stealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rdp_stealer.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe 3440 rdp_stealer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3440 rdp_stealer.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rdp_stealer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rdp_stealer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rdp_stealer.exe"C:\Users\Admin\AppData\Local\Temp\rdp_stealer.exe"1⤵
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3440
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
270KB
MD510c930c69e6d19bbd19da56f5a12d2b5
SHA19088e2bd8733dece854a5513542f5217947ea3fb
SHA25694e2cae84b425c71a2aef601947e567d3c2086652f8a98ac23b849da530987da
SHA5120b3c1f7a5ef174ffaeeb17d5e061cdb868c01c4bce1ec0b017a1b9f9784c3746534455a99c219d6a1a6e6331461ff936e76639883016c6e34c7bd45496222036
-
Filesize
434KB
MD523c6d57546bafb82c756e144808b64cf
SHA136fbdb4fb72b4e3f3e02e60a231babe8761b048d
SHA256deb7a2261c011935970ec9d9eb5389d0f9c17b01b020cbb3402e9e2b7e55f7eb
SHA512bc0ddf6e2f52f2758380e1092e48f9461de501a5021247dba658e1b9a7511110ba670a54b4e3d3c3362dc34bf63c70c5b81ef4f6c34e435c14abbf67a76ae71b
-
Filesize
470KB
MD5a55a141dc3a5081ae725f2ab53cafbda
SHA15dc91842cd46027133a9ca5ac3a63e6b0be490f8
SHA256571c84e0e1936b36632ea218b341e67c3204a289cbf15d19961574ca6d782f5a
SHA5126da0854fcfd091f8b3c3f8e82eb2ffbbbedebba54c3cdfb76d566161df7963e18be5377de084faad6a576d0662a3c0072cfe65697a4d57005cd62772fc5a3c16
-
Filesize
1.4MB
MD55d647b2ce987c9e6b99988300c25bd28
SHA1c11561be0bbf2e91bf08ab1691f070647735bfe0
SHA256bf3dd69d2e089cf51c572b20734a472cf54e4163fe26213cb65ce51bd9991113
SHA512148308b0469eb241edaf067b53e7c4ff2d8775e376242d3200611b7d3e005dd93c87815ca1af05d30e870f2aa79f3a3f40244ce0a60d8f2ea22b044d4706e162
-
Filesize
443KB
MD5e68d2085d9389fbac931370153e688a0
SHA1e240ee05a6bd6c67c91661d2558bfc50614102f4
SHA2569df8e6fa4d85b0be767933a134b5bf9ff9664ad0e5943bf1f47b6292abcd60ce
SHA5123c5287ba4bc22e5831f39d620ef8289dd701cf8a4aca064938a6599c9fb19e49db1dfa8ab698a3edc75d697f8a9ae7162b315ed42d79b8555d2a01862fc59eb0
-
Filesize
392KB
MD5d6bd0fa5f2d9522e3774b09a9383d967
SHA1eec8dbafa407b82de09feddc69c2760e76475066
SHA2567801b6729ce82c19ea842fe16697801aef12242ffb62ea32234d3885f1473923
SHA51208c6ad5ab7b3bf6103c372b9900a75c689deb9683a15220e8a36550ebad57e19239159b6fecd1241baafdd8cdc8cf66fc4b168c006f57e7c2e4e0b2ca4ba0db6
-
Filesize
220KB
MD5110df8bdaf2175e191af9942cd1697dc
SHA127e9b83e4ac98d1234b49e02d3059cc8d11fe85b
SHA25607e1aec7aa8206c922aa58ca63541adc25a85569da22db5abc02bee09d4719cc
SHA5122acbd29a6301ffe1f64687d8d2f4835478e882551a4b67b75a341662899858ad1cd69ce5b5f7e83132f754c31e78180f1f45db54ecfaf1220f3ec9a53968894e
-
Filesize
451KB
MD5fea8767357b603dc19889257a64f1613
SHA19080a407a1f11fd6a53996109cbde040e6021647
SHA2566ff65a9f98fcda4f910bcf29d26c8969fb969eb28b81a83d6a4a94812853d5d5
SHA512122b830eb0f8575f563f3af074f7fef555803f342b33574f114fb77bb7b5a56e5374f49094925cbe04c67be9858debe0cb8598eb1956c7eb22790ca2da03c0a1
-
Filesize
209KB
MD516249a9bab88018cc7c002f5e0702ded
SHA15186596d37e7ed930a0d0e334c39f0100a26e301
SHA2564c1a604c87351ecfa989d4d22f05a672d6b8c64fad3b53714dba5a62c6a95804
SHA51259dd52e2a8137257018b5176e33851eba91bab50f4309a81701f5ee819b65ea91cec41fc881e82b95c6610ff5c673c6f191b0fdf5351e4da954578752bb4bd00
-
Filesize
506KB
MD5283ba7c13196636bd85bbb8bbae6501d
SHA1a824b0ae62844e1c1e620d1feb2c33558e2b47c7
SHA256b6510cc299c221e40ea089e7b9e53cbea22e386a4b99e87fc3fe6b3de6f8a2e7
SHA51292ca1a0468c5092458c3d7c8866a79298e5e2ef23e5a8cc5c36f117c77b242c972f3b609d29f5473a6cb5e369885d950e2341d3c5f36b0d27199312e87002e23
-
Filesize
4KB
MD52253a93df8fee889d868c68f2a0a7e84
SHA11b8e9ca4f46502a2579f7486004adad67d7d1213
SHA25660b1d24b16d16a761f10e8282362df4f3c583300f19f97bea4d0d81e5b0d2c12
SHA512aee86dafd17509bfa59eefe7a12411a4022118a9a7dda690055425dc37103936f7cefe8d9ce557756dc45ddcadbc53506eeed1e33d52c58f27130b0307ff302d