Windows
Analysis Report
StormKittyXZeroTrace.exe.bin.exe
Overview
General Information
Detection
StormKitty
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Attempt to bypass Chrome Application-Bound Encryption
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Suricata IDS alerts for network traffic
Yara detected Generic Stealer
Yara detected StormKitty Stealer
Yara detected Telegram RAT
Yara detected Telegram Recon
.NET source code references suspicious native API functions
Contains functionality to capture screen (.Net source)
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses the Telegram API (likely for C&C communication)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Browser Started with Remote Debugging
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
StormKittyXZeroTrace.exe.bin.exe (PID: 7108 cmdline:
"C:\Users\ user\Deskt op\StormKi ttyXZeroTr ace.exe.bi n.exe" MD5: AE95DF8DBC1FA111E8BDB7D071CF0DB0) cmd.exe (PID: 6476 cmdline:
"cmd.exe" /C chcp 65 001 && net sh wlan sh ow profile | findstr All MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 6480 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) chcp.com (PID: 6620 cmdline:
chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF) netsh.exe (PID: 6664 cmdline:
netsh wlan show prof ile MD5: 4E89A1A088BE715D6C946E55AB07C7DF) findstr.exe (PID: 6708 cmdline:
findstr Al l MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) cmd.exe (PID: 6800 cmdline:
"cmd.exe" /C chcp 65 001 && net sh wlan sh ow network s mode=bss id MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 6844 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) chcp.com (PID: 6828 cmdline:
chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF) netsh.exe (PID: 6912 cmdline:
netsh wlan show netw orks mode= bssid MD5: 4E89A1A088BE715D6C946E55AB07C7DF) chrome.exe (PID: 3356 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --wi ndow-posit ion=-2400, -2400 --re mote-debug ging-port= 9222 --pro file-direc tory="Defa ult" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 6520 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=1984,i ,405979328 1164060634 ,119831818 4426578781 2,262144 - -variation s-seed-ver sion=20250 306-183004 .429000 -- mojo-platf orm-channe l-handle=2 168 /prefe tch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Cameleon, StormKitty | PWC describes this malware as a backdoor, capable of file management, upload and download of files, and execution of commands. | No Attribution |
{"C2 url": "https://api.telegram.org/bot8012951680:AAFEQmvyUuE56tBcSf7T4NBD4jzoxpVWuJs/sendMessage", "Telegram Stream": [{"ok": true, "result": {"message_id": 28, "from": {"id": 8012951680, "is_bot": true, "first_name": "stealer", "username": "cryptostealerrrr_bot"}, "chat": {"id": -4711924264, "title": "ffff", "type": "group", "all_members_are_administrators": true}, "date": 1741958550, "document": {"file_name": "8.46.123.189.zip", "mime_type": "application/zip", "file_id": "BQACAgQAAxkDAAMcZ9QtloMtHZ3--jXxXAVoy-HbvQIAAtUTAALS6qFS-LkEHYqHoq42BA", "file_unique_id": "AgAD1RMAAtLqoVI", "file_size": 686505}}}]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_TelegramRecon | Yara detected Telegram Recon | Joe Security | ||
JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
infostealer_win_stormkitty | Finds StormKitty samples (or their variants) based on specific strings | Sekoia.io |
| |
Click to see the 4 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GenericStealer_9 | Yara detected Generic Stealer | Joe Security | ||
JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen |
| |
JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | ||
Click to see the 10 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
infostealer_win_stormkitty | Finds StormKitty samples (or their variants) based on specific strings | Sekoia.io |
| |
INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen |
| |
Click to see the 3 entries |
System Summary |
---|
Source: | Author: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Stealing of Sensitive Information |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-14T14:22:29.445161+0100 | 2843856 | 1 | A Network Trojan was detected | 192.168.2.7 | 49699 | 149.154.167.220 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-14T14:22:29.438054+0100 | 1810008 | 1 | Potentially Bad Traffic | 192.168.2.7 | 49699 | 149.154.167.220 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 0_2_05356448 | |
Source: | Code function: | 0_2_0535643C |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |