General

  • Target

    5ecb7f90c0704ddcb00fe5584a022d73.ps1

  • Size

    447KB

  • Sample

    250228-z4ejjaxzcx

  • MD5

    822b7414d0d51d0333961d0d6ca31a21

  • SHA1

    5158458cb99899b4d8aacd26c1d4fce917eb8460

  • SHA256

    e8bfcb075d43c9447a0e06aced6be8a2ba9536dbf889aade07670d9b90af37ec

  • SHA512

    26fc07adb5267bd8fb22964b69d61f35ac2483f733560a0385850b440d07d4e08a9f08c254c40e72fdff97bbf6f299347933ab25d7a86db5a3abe29a25aec2e6

  • SSDEEP

    12288:oxX8oYy+BkhmwEjO9zpF8naw8ew8pLiyI:/khNdF4n2j

Malware Config

Targets

    • Target

      5ecb7f90c0704ddcb00fe5584a022d73.ps1

    • Size

      447KB

    • MD5

      822b7414d0d51d0333961d0d6ca31a21

    • SHA1

      5158458cb99899b4d8aacd26c1d4fce917eb8460

    • SHA256

      e8bfcb075d43c9447a0e06aced6be8a2ba9536dbf889aade07670d9b90af37ec

    • SHA512

      26fc07adb5267bd8fb22964b69d61f35ac2483f733560a0385850b440d07d4e08a9f08c254c40e72fdff97bbf6f299347933ab25d7a86db5a3abe29a25aec2e6

    • SSDEEP

      12288:oxX8oYy+BkhmwEjO9zpF8naw8ew8pLiyI:/khNdF4n2j

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops startup file

MITRE ATT&CK Enterprise v15

Tasks