General

  • Target

    SilverClient.exe

  • Size

    37KB

  • Sample

    250214-swh4esspaw

  • MD5

    776fac12ea695a8f220fc086ac25be69

  • SHA1

    dd90c8b3f18da5c7791a0a1d023fc829e8e6fc71

  • SHA256

    4d42a51d71daae6e4fcf09e5030cce2f9d220a0d4106fca7e0bee974b0fbff0c

  • SHA512

    d6c468d337013025106913092a3c1863acdcdcd1811e5caf6327ab06538cbbf193f1354e836e41495a0dcbc1fd049478765bfdfb39ecb586750452e7dacd7b73

  • SSDEEP

    768:z98X+6AlPNHIcSHLgBaRJGw9I9YB6SPMTtvsGvJE:x8Xhj5j93ofTtUGvJE

Malware Config

Targets

    • Target

      SilverClient.exe

    • Size

      37KB

    • MD5

      776fac12ea695a8f220fc086ac25be69

    • SHA1

      dd90c8b3f18da5c7791a0a1d023fc829e8e6fc71

    • SHA256

      4d42a51d71daae6e4fcf09e5030cce2f9d220a0d4106fca7e0bee974b0fbff0c

    • SHA512

      d6c468d337013025106913092a3c1863acdcdcd1811e5caf6327ab06538cbbf193f1354e836e41495a0dcbc1fd049478765bfdfb39ecb586750452e7dacd7b73

    • SSDEEP

      768:z98X+6AlPNHIcSHLgBaRJGw9I9YB6SPMTtvsGvJE:x8Xhj5j93ofTtUGvJE

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks