General
-
Target
bc7EKCf.exe
-
Size
2.9MB
-
Sample
250109-lzglfaynek
-
MD5
c042e73bc713b483058772dabf080733
-
SHA1
06f64d679249be4d555fc81e495b871b09b98976
-
SHA256
01dc20c640b1a5d41354f57e06b324ff2a5753cd1ef98c5f5773c5475284e27d
-
SHA512
a019c0fa3dd6f179fe748a33aa4f5e62197b232cadca5b481fbb75688ec81dd1b78c7ddd3e64744f7ffca6b578a26382b66ca3982e394b1c61412193c1eaf98f
-
SSDEEP
49152:XTPo/58bWNrFMnwfHvo1FyeOhJG0BNpBtDmMT2N1a3wc2zmHayHNABEc4v0OqMPE:XzoBG+FMwfP6FyTiipHaMT2ukAtUFL4J
Static task
static1
Behavioral task
behavioral1
Sample
bc7EKCf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc7EKCf.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bc7EKCf.exe
-
Size
2.9MB
-
MD5
c042e73bc713b483058772dabf080733
-
SHA1
06f64d679249be4d555fc81e495b871b09b98976
-
SHA256
01dc20c640b1a5d41354f57e06b324ff2a5753cd1ef98c5f5773c5475284e27d
-
SHA512
a019c0fa3dd6f179fe748a33aa4f5e62197b232cadca5b481fbb75688ec81dd1b78c7ddd3e64744f7ffca6b578a26382b66ca3982e394b1c61412193c1eaf98f
-
SSDEEP
49152:XTPo/58bWNrFMnwfHvo1FyeOhJG0BNpBtDmMT2N1a3wc2zmHayHNABEc4v0OqMPE:XzoBG+FMwfP6FyTiipHaMT2ukAtUFL4J
-
StormKitty payload
-
Stormkitty family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
A potential corporate email address has been identified in the URL: SystemReportDate2025010995813AMOperatingSystemWindows10Pro64BitUserNameAdminComputerNameGUMLNLFEIPAddress181.215.176.83LanguageandRegionenUSAVNotinstalledKeywordsKeywordsNodataBrowserandApplicationDataCookies1Bookmarks5SoftwareandAccountInfoDownloadArchivedDatahttpgetwin11.comnullAdmin@GUMLNLFEenUS.zipArchivePasswordfaa89168490baa09fa10ccbfdb5a17b8
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1