Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2025 18:01
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20240903-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20250217-en
5 signatures
150 seconds
General
-
Target
build.exe
-
Size
106KB
-
MD5
d493043aa0552958e41056bfb9ed5feb
-
SHA1
3bc3589ad6f4dd49d9b8286061abfebbfe9bf192
-
SHA256
1bbf4c9d2abb1b0fa5752c0f401cc1cb04fd6469622be6d87486aae73fdcce4b
-
SHA512
69a81f35a199307efd9a6b50f12a783c8b7439d6fca554a1d9a6d8405b0fe8e65acdf15df89a710d03acf6d9a0a176acf0ed9cdb4fd7bb0f666705821ec2ccee
-
SSDEEP
1536:87YfZJRZk79XP3yTigigkD2V37AUIuvQ7sG69bAdI4pxReUbpppybDQJ:s+RZk753yTwQOWQ7sR9bGpxReUbppz
Score
10/10
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4516-1-0x0000000000310000-0x0000000000330000-memory.dmp family_stormkitty -
Stormkitty family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4516 build.exe