General
-
Target
Build.exe
-
Size
245KB
-
Sample
250331-qx9xes1tay
-
MD5
8ada41ef81ed91792ec1bc128daa0d2f
-
SHA1
12064be78a56ee540b1fa8d2257dcf487de4e82d
-
SHA256
a7d45abc7981ac8e1d5e2f7e64ac063c083d9112dd8cd79440d892360b3a3224
-
SHA512
a4e086f307dce33cfc3abc13989b8da8d2558ecf85a0f5e04338fb441560a56e94281c3afbb1a06f2dc18ee4e5149b1a28a0e11c05a7d7b6a1117a436000dc5d
-
SSDEEP
6144:Ze5/oFzXx7YxnXywmipeHlUusJQLoqb+tpbz:U5wFzB7YxnXy+peOvL
Behavioral task
behavioral1
Sample
Build.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
Build.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
Build.exe
Resource
win11-20250313-en
Malware Config
Targets
-
-
Target
Build.exe
-
Size
245KB
-
MD5
8ada41ef81ed91792ec1bc128daa0d2f
-
SHA1
12064be78a56ee540b1fa8d2257dcf487de4e82d
-
SHA256
a7d45abc7981ac8e1d5e2f7e64ac063c083d9112dd8cd79440d892360b3a3224
-
SHA512
a4e086f307dce33cfc3abc13989b8da8d2558ecf85a0f5e04338fb441560a56e94281c3afbb1a06f2dc18ee4e5149b1a28a0e11c05a7d7b6a1117a436000dc5d
-
SSDEEP
6144:Ze5/oFzXx7YxnXywmipeHlUusJQLoqb+tpbz:U5wFzB7YxnXy+peOvL
-
StormKitty payload
-
Stormkitty family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2