General

  • Target

    WalletCracker_V1.2.exe

  • Size

    361KB

  • Sample

    250329-ye62tawpz2

  • MD5

    e6fc4397e0e7c76c82a6925479f94f13

  • SHA1

    db2b79b7947c55cb6ea942c4edd61067e597b264

  • SHA256

    ccb9b81d8fdc40e89df2fb8ef48b76738036b233014e930dca321e4a026a4702

  • SHA512

    8d408b1e749f601a7e0e6ae2bbfd0284f7b3396aabe2d6660729fa490a53d229ba7d2d5785ad247b1ad9b5195687929b55e914d987475394079d95b135e9d594

  • SSDEEP

    6144:Me5/oFzXx7YxnXywmipeHlUxsJQLoqb+tpbzHb:D5wFzB7YxnXy+pefvL

Malware Config

Targets

    • Target

      WalletCracker_V1.2.exe

    • Size

      361KB

    • MD5

      e6fc4397e0e7c76c82a6925479f94f13

    • SHA1

      db2b79b7947c55cb6ea942c4edd61067e597b264

    • SHA256

      ccb9b81d8fdc40e89df2fb8ef48b76738036b233014e930dca321e4a026a4702

    • SHA512

      8d408b1e749f601a7e0e6ae2bbfd0284f7b3396aabe2d6660729fa490a53d229ba7d2d5785ad247b1ad9b5195687929b55e914d987475394079d95b135e9d594

    • SSDEEP

      6144:Me5/oFzXx7YxnXywmipeHlUxsJQLoqb+tpbzHb:D5wFzB7YxnXy+pefvL

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks