General

  • Target

    SilverClient.exe

  • Size

    33KB

  • Sample

    250206-vyw46s1pay

  • MD5

    5675594ba9110a749bdd1bf9d2cf4252

  • SHA1

    2fc803ba59555b3f58bb1be8e4eac4bdd291c472

  • SHA256

    cb94a8e6572ceb8cb0e6649a1956390521f19d5642f7693187d364fba23735b4

  • SHA512

    975ce3d094de70a8b4fa59b557ed3229e5d04d6fe21c2206451b8a91cccbd33748b1159e50e9e9332240897ea2f0a75f6c320e81a6c0c686de5b93e5e22a317b

  • SSDEEP

    768:t0tAjVc38hoGxfV9g9LnvR10z1QB6SjME:vf99g9LnvI1QowME

Malware Config

Targets

    • Target

      SilverClient.exe

    • Size

      33KB

    • MD5

      5675594ba9110a749bdd1bf9d2cf4252

    • SHA1

      2fc803ba59555b3f58bb1be8e4eac4bdd291c472

    • SHA256

      cb94a8e6572ceb8cb0e6649a1956390521f19d5642f7693187d364fba23735b4

    • SHA512

      975ce3d094de70a8b4fa59b557ed3229e5d04d6fe21c2206451b8a91cccbd33748b1159e50e9e9332240897ea2f0a75f6c320e81a6c0c686de5b93e5e22a317b

    • SSDEEP

      768:t0tAjVc38hoGxfV9g9LnvR10z1QB6SjME:vf99g9LnvI1QowME

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks