Threat name:
Dacic, StormKitty, VenomRAT, XWorm, EICAR, XWor
Alert
Classification:
rans.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to log keystrokes (.Net Source)
Disable Windows Defender real time protection (registry)
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Windows Service Tampering
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Uses whoami command line tool to query computer and username
Writes to foreign memory regions
Yara detected StormKitty Stealer
Yara detected Telegram RAT
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1822099
Sample:
Request for Quotation_RFQ#3...
Startdate:
28/11/2025
Architecture:
WINDOWS
Score:
100
141
api.telegram.org
2->141
143
ip-api.com
2->143
145
3 other IPs or domains
2->145
187
Suricata IDS alerts
for network traffic
2->187
189
Found malware configuration
2->189
191
Malicious sample detected
(through community Yara
rule)
2->191
195
27 other signatures
2->195
15
Request for Quotation_RFQ#3200025006.cmd.exe
4
2->15
started
19
chromiuni.exe
2->19
started
21
tmRZBtg.exe
2->21
started
23
2 other processes
2->23
signatures3
193
Uses the Telegram API
(likely for C&C
communication)
141->193
process4
file5
137
Request for Quotat...0025006.cmd.exe.log, ASCII
15->137
dropped
157
Binary is likely a compiled
AutoIt script file
15->157
159
Adds a directory exclusion
to Windows Defender
15->159
161
Injects a PE file into
a foreign processes
15->161
25
Request for Quotation_RFQ#3200025006.cmd.exe
4
15->25
started
28
powershell.exe
23
15->28
started
163
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
19->163
165
Queries sensitive Plug
and Play Device Information
(via WMI, Win32_PnPEntity,
often done to detect
virtual machines)
19->165
167
Encrypted powershell
cmdline option found
19->167
169
Tries to harvest and
steal WLAN passwords
19->169
30
powershell.exe
19->30
started
32
powershell.exe
19->32
started
34
schtasks.exe
19->34
started
40
2 other processes
19->40
171
Tries to delay execution
(extensive OutputDebugStringW
loop)
21->171
173
Queries memory information
(via WMI often done
to detect virtual machines)
21->173
36
schtasks.exe
21->36
started
38
tmRZBtg.exe
21->38
started
42
2 other processes
23->42
signatures6
process7
signatures8
201
Binary is likely a compiled
AutoIt script file
25->201
203
Writes to foreign memory
regions
25->203
205
Maps a DLL or memory
area into another process
25->205
44
RegSvcs.exe
19
7
25->44
started
207
Suspicious powershell
command line found
28->207
209
Uses whoami command
line tool to query computer
and username
28->209
211
Loading BitLocker PowerShell
Module
28->211
49
conhost.exe
28->49
started
51
conhost.exe
30->51
started
53
conhost.exe
32->53
started
55
conhost.exe
34->55
started
57
conhost.exe
36->57
started
process9
dnsIp10
147
178.16.55.129, 4415, 49720, 49722
DUSNET-ASDE
Germany
44->147
149
api.telegram.org
149.154.167.220, 443, 49718
TELEGRAMRU
United Kingdom
44->149
131
C:\Users\user\AppData\Local\Temp\msxtqy.bat, PE32
44->131
dropped
133
C:\Users\user\AppData\Roaming\XClient.exe, PE32
44->133
dropped
135
C:\Users\user\AppData\...\Protect544cd51a.dll, PE32
44->135
dropped
231
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
44->231
59
msxtqy.bat
44->59
started
file11
signatures12
process13
file14
127
C:\Users\user\AppData\Roaming\tmRZBtg.exe, PE32
59->127
dropped
129
C:\Users\user\AppData\Local\...\tmp399E.tmp, XML
59->129
dropped
223
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
59->223
225
Uses schtasks.exe or
at.exe to add and modify
task schedules
59->225
227
Adds a directory exclusion
to Windows Defender
59->227
229
3 other signatures
59->229
63
msxtqy.bat
59->63
started
66
powershell.exe
59->66
started
69
powershell.exe
59->69
started
71
schtasks.exe
59->71
started
signatures15
process16
file17
139
C:\Users\user\AppData\Local\...\chromiuni.exe, PE32
63->139
dropped
73
cmd.exe
63->73
started
75
cmd.exe
63->75
started
185
Loading BitLocker PowerShell
Module
66->185
78
conhost.exe
66->78
started
80
conhost.exe
69->80
started
82
conhost.exe
71->82
started
signatures18
process19
signatures20
84
chromiuni.exe
73->84
started
87
conhost.exe
73->87
started
89
timeout.exe
73->89
started
219
Uses netsh to modify
the Windows network
and firewall settings
75->219
221
Tries to harvest and
steal WLAN passwords
75->221
91
conhost.exe
75->91
started
93
schtasks.exe
75->93
started
process21
signatures22
197
Adds a directory exclusion
to Windows Defender
84->197
199
Injects a PE file into
a foreign processes
84->199
95
chromiuni.exe
84->95
started
100
powershell.exe
84->100
started
102
powershell.exe
84->102
started
104
2 other processes
84->104
process23
dnsIp24
151
ip-api.com
208.95.112.1, 49730, 80
TUT-ASUS
United States
95->151
153
icanhazip.com
104.16.184.241, 49729, 80
CLOUDFLARENETUS
United States
95->153
155
2 other IPs or domains
95->155
121
C:\Users\user\AppData\...behaviorgraphIGIYTFFYT.docx, ASCII
95->121
dropped
123
C:\Users\user\AppData\...\TQDFJHPUIU.png, ASCII
95->123
dropped
125
C:\Users\user\AppData\...IVQSAOTAQ.docx, ASCII
95->125
dropped
175
Found many strings related
to Crypto-Wallets (likely
being stolen)
95->175
177
Encrypted powershell
cmdline option found
95->177
179
Tries to harvest and
steal browser information
(history, passwords,
etc)
95->179
183
2 other signatures
95->183
106
powershell.exe
95->106
started
109
cmd.exe
95->109
started
111
cmd.exe
95->111
started
181
Loading BitLocker PowerShell
Module
100->181
113
conhost.exe
100->113
started
115
conhost.exe
102->115
started
117
conhost.exe
104->117
started
file25
signatures26
process27
signatures28
213
Suspicious powershell
command line found
106->213
215
Uses whoami command
line tool to query computer
and username
106->215
119
conhost.exe
106->119
started
217
Tries to harvest and
steal WLAN passwords
109->217
process29
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.