General
-
Target
WalletCracker_V1.2.exe
-
Size
361KB
-
Sample
250329-ye62tawpz2
-
MD5
e6fc4397e0e7c76c82a6925479f94f13
-
SHA1
db2b79b7947c55cb6ea942c4edd61067e597b264
-
SHA256
ccb9b81d8fdc40e89df2fb8ef48b76738036b233014e930dca321e4a026a4702
-
SHA512
8d408b1e749f601a7e0e6ae2bbfd0284f7b3396aabe2d6660729fa490a53d229ba7d2d5785ad247b1ad9b5195687929b55e914d987475394079d95b135e9d594
-
SSDEEP
6144:Me5/oFzXx7YxnXywmipeHlUxsJQLoqb+tpbzHb:D5wFzB7YxnXy+pefvL
Behavioral task
behavioral1
Sample
WalletCracker_V1.2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WalletCracker_V1.2.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
WalletCracker_V1.2.exe
-
Size
361KB
-
MD5
e6fc4397e0e7c76c82a6925479f94f13
-
SHA1
db2b79b7947c55cb6ea942c4edd61067e597b264
-
SHA256
ccb9b81d8fdc40e89df2fb8ef48b76738036b233014e930dca321e4a026a4702
-
SHA512
8d408b1e749f601a7e0e6ae2bbfd0284f7b3396aabe2d6660729fa490a53d229ba7d2d5785ad247b1ad9b5195687929b55e914d987475394079d95b135e9d594
-
SSDEEP
6144:Me5/oFzXx7YxnXywmipeHlUxsJQLoqb+tpbzHb:D5wFzB7YxnXy+pefvL
-
StormKitty payload
-
Stormkitty family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2