Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 20:37
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20250217-en
5 signatures
150 seconds
General
-
Target
build.exe
-
Size
106KB
-
MD5
7d86ce63fb857ca060c4fe1064c76e61
-
SHA1
7ff1d6366e0545cf1b98a8410fb0abd19195e8dd
-
SHA256
3ecfbaf4769c2db033505aed0c69fa8c0fda8dda9e343af7ccaf0d50457bd1e0
-
SHA512
12f4292f4b6f337da19edbc5071d4e20599da1f7e07cb8ed06b950a7888251a9ec26a07e5d84c2aa935d5613b99de84bab679b43016c17939d353973d56f24a9
-
SSDEEP
1536:U7YfZJRZk79wZn8nESiIkD2V37AUIuvQ7sG69bAdI4pxReUbpqp6bDQx:U+RZk7WZnc4YOWQ7sR9bGpxReUbpqD
Score
10/10
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2108-1-0x0000000001340000-0x0000000001360000-memory.dmp family_stormkitty -
Stormkitty family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2108 build.exe