General

  • Target

    bc7EKCf.exe

  • Size

    2.9MB

  • Sample

    250109-lzglfaynek

  • MD5

    c042e73bc713b483058772dabf080733

  • SHA1

    06f64d679249be4d555fc81e495b871b09b98976

  • SHA256

    01dc20c640b1a5d41354f57e06b324ff2a5753cd1ef98c5f5773c5475284e27d

  • SHA512

    a019c0fa3dd6f179fe748a33aa4f5e62197b232cadca5b481fbb75688ec81dd1b78c7ddd3e64744f7ffca6b578a26382b66ca3982e394b1c61412193c1eaf98f

  • SSDEEP

    49152:XTPo/58bWNrFMnwfHvo1FyeOhJG0BNpBtDmMT2N1a3wc2zmHayHNABEc4v0OqMPE:XzoBG+FMwfP6FyTiipHaMT2ukAtUFL4J

Malware Config

Targets

    • Target

      bc7EKCf.exe

    • Size

      2.9MB

    • MD5

      c042e73bc713b483058772dabf080733

    • SHA1

      06f64d679249be4d555fc81e495b871b09b98976

    • SHA256

      01dc20c640b1a5d41354f57e06b324ff2a5753cd1ef98c5f5773c5475284e27d

    • SHA512

      a019c0fa3dd6f179fe748a33aa4f5e62197b232cadca5b481fbb75688ec81dd1b78c7ddd3e64744f7ffca6b578a26382b66ca3982e394b1c61412193c1eaf98f

    • SSDEEP

      49152:XTPo/58bWNrFMnwfHvo1FyeOhJG0BNpBtDmMT2N1a3wc2zmHayHNABEc4v0OqMPE:XzoBG+FMwfP6FyTiipHaMT2ukAtUFL4J

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • A potential corporate email address has been identified in the URL: SystemReportDate2025010995813AMOperatingSystemWindows10Pro64BitUserNameAdminComputerNameGUMLNLFEIPAddress181.215.176.83LanguageandRegionenUSAVNotinstalledKeywordsKeywordsNodataBrowserandApplicationDataCookies1Bookmarks5SoftwareandAccountInfoDownloadArchivedDatahttpgetwin11.comnullAdmin@GUMLNLFEenUS.zipArchivePasswordfaa89168490baa09fa10ccbfdb5a17b8

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks