General

  • Target

    3b8c39bef53b1afb7f76ff272ab8b5d7.exe

  • Size

    2.6MB

  • Sample

    250226-xsl35azmw8

  • MD5

    3b8c39bef53b1afb7f76ff272ab8b5d7

  • SHA1

    92b28951730aab117635d0f5fc9884b3f4390bec

  • SHA256

    4dc248ee0e25614ebcb042d3a57b5015321ef07be5dbe01573f692033d4422f8

  • SHA512

    d9c06a9821fac63da01d9e03149050287d60e5455f7a2550bb5cab12e725117ff880afed6aa3942f1035376e05470b021195c8436470690be48072f90808b055

  • SSDEEP

    49152:KgUfcdbLWnFiTMwfDGknBGR6GaeKUx7YQfn:KgUkLtdfD3nQUjUx7Z

Malware Config

Targets

    • Target

      3b8c39bef53b1afb7f76ff272ab8b5d7.exe

    • Size

      2.6MB

    • MD5

      3b8c39bef53b1afb7f76ff272ab8b5d7

    • SHA1

      92b28951730aab117635d0f5fc9884b3f4390bec

    • SHA256

      4dc248ee0e25614ebcb042d3a57b5015321ef07be5dbe01573f692033d4422f8

    • SHA512

      d9c06a9821fac63da01d9e03149050287d60e5455f7a2550bb5cab12e725117ff880afed6aa3942f1035376e05470b021195c8436470690be48072f90808b055

    • SSDEEP

      49152:KgUfcdbLWnFiTMwfDGknBGR6GaeKUx7YQfn:KgUkLtdfD3nQUjUx7Z

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks