General

  • Target

    e3640607de0c7b2faee39b84bb660624714d2127af72f94647b2156fd69e7de6.exe

  • Size

    123KB

  • Sample

    250215-2r8yqaylak

  • MD5

    91e525d7122f90730e6a77b643fb1eb6

  • SHA1

    0b719cfaad5aa8a240d2b139c1b75266e0642c81

  • SHA256

    e3640607de0c7b2faee39b84bb660624714d2127af72f94647b2156fd69e7de6

  • SHA512

    9e841f3a2ee95dbe931bbf79ee485871aa7c18d81756bf4d17b87eac5d6c55814eac77a1000eb4cefef5a44026fac7878c72dba8f43303dfef8922aa1df1f495

  • SSDEEP

    3072:Zn28xnE4SfnDGt7mTT287TFbi9kN72U53TXMmr5:BNnE5M7Uy0bwSV

Malware Config

Targets

    • Target

      e3640607de0c7b2faee39b84bb660624714d2127af72f94647b2156fd69e7de6.exe

    • Size

      123KB

    • MD5

      91e525d7122f90730e6a77b643fb1eb6

    • SHA1

      0b719cfaad5aa8a240d2b139c1b75266e0642c81

    • SHA256

      e3640607de0c7b2faee39b84bb660624714d2127af72f94647b2156fd69e7de6

    • SHA512

      9e841f3a2ee95dbe931bbf79ee485871aa7c18d81756bf4d17b87eac5d6c55814eac77a1000eb4cefef5a44026fac7878c72dba8f43303dfef8922aa1df1f495

    • SSDEEP

      3072:Zn28xnE4SfnDGt7mTT287TFbi9kN72U53TXMmr5:BNnE5M7Uy0bwSV

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks