MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f3a4b0da6aee356030a581a3423a43136821add76ba78f22455e5bc99b947c56. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



StormKitty


Vendor detections: 16


Intelligence 16 IOCs YARA 20 File information Comments

SHA256 hash: f3a4b0da6aee356030a581a3423a43136821add76ba78f22455e5bc99b947c56
SHA3-384 hash: e183158e1c5a8aaef2650adc952bc5984e8ea2690e1ade434639cb6fc66f9f57ce0c1e6be5be19560ddc128a44a5af48
SHA1 hash: 6c3de7926cd0e9cdf2ba4d81b6d4b6ddd3396e36
MD5 hash: f8b4de48377048dae1a44ec5db2248df
humanhash: vermont-november-gee-paris
File name:IDM_64~1.EXE
Download: download sample
Signature StormKitty
File size:4'790'392 bytes
First seen:2025-12-23 16:56:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9cbefe68f395e67356e2a5d8d1b285c0 (58 x LummaStealer, 49 x AuroraStealer, 37 x Vidar)
ssdeep 49152:0Q6PXmDllrb/T0vO90d7HjmAFd4A64nsfJMBq+AQrNKtpMdTuV5dHJM/5+0zX8MY:ptoBq+tWqSb+MMXFH5yU4BDGerofk
Threatray 72 similar samples on MalwareBazaar
TLSH T1DC268D09EC240674C5A9827056F304D99E3ABDD53B501AF726BD7ABD0F235C46ABE2CC
gimphash a86e5e6f244194b39d2b73177a129e924dc9dc4433f2a6fbc9ace9301a575e7f
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter aachum
Tags:178-22-24-175 exe StormKitty VenomRAT vidar


Avatar
iamaachum
https://downloadtorrentfile.com/hash/5ab4176a2d094f3d361705e2c23be3afabdb4ee2?name=Internet%20Download%20Manager%20%28IDM%29%20v6.42%20Build%2042%20%2b%20Fix%7bCracksHash%7d

VenomRAT C2: 178.22.24.175:4449
Vidar C2:
https://telegram.me/gal17d
https://steamcommunity.com/profiles/76561198759765485
https://xet.multiatend.com.br/

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
FR FR
Vendor Threat Intelligence
Malware configuration found for:
Going VenomRAT
Details
Going
a sub-decoded component
VenomRAT
c2 socket addresses, a mutex, a missionid, a version, filepaths, a server signature, an X509 certificate, and possibly CryptoCurrency addresses
Malware family:
asyncrat
ID:
1
File name:
_f3a4b0da6aee356030a581a3423a43136821add76ba78f22455e5bc99b947c56.exe
Verdict:
Malicious activity
Analysis date:
2025-12-23 16:57:45 UTC
Tags:
golang auto-reg pastebin generic stealer stormkitty asyncrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
injection dropper emotet virus
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-09-18T18:06:00Z UTC
Last seen:
2025-11-25T15:02:00Z UTC
Hits:
~100
Detections:
Backdoor.MSIL.VenomRAT.a Trojan-PSW.Win32.Coins.sb Trojan-PSW.MSIL.Agent.sb Backdoor.MSIL.Crysan.c BSS:Trojan.Win32.Generic.nblk Trojan-PSW.MSIL.Stealerium.sb Trojan-PSW.MSIL.Stealer.sb Backdoor.MSIL.Crysan.sb VHO:Backdoor.MSIL.Crysan.gen Trojan-PSW.MSIL.Stealerium.rs BSS:Trojan.Win32.Generic Trojan.MSIL.DInvoke.sb HEUR:Trojan-PSW.MSIL.Stealerium.pef Exploit.Win32.BypassUAC.sb Trojan.MSIL.Agent.sb
Result
Threat name:
DcRat, Gocoder, KeyLogger, StormKitty, V
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Creates autostart registry keys with suspicious names
Drops PE files to the document folder of the user
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected BrowserPasswordDump
Yara detected DcRat
Yara detected Gocoder ransomware
Yara detected StormKitty Stealer
Yara detected VenomRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1838324 Sample: IDM_64#U007e1.EXE.exe Startdate: 23/12/2025 Architecture: WINDOWS Score: 100 75 pastebin.com 2->75 77 edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com 2->77 83 Suricata IDS alerts for network traffic 2->83 85 Found malware configuration 2->85 87 Malicious sample detected (through community Yara rule) 2->87 91 11 other signatures 2->91 14 IDM_64#U007e1.EXE.exe 1 2->14         started        18 IDM_64#U007e1.EXE.exe 2->18         started        20 IDM_64#U007e1.EXE.exe 2->20         started        signatures3 89 Connects to a pastebin service (likely for C&C) 75->89 process4 file5 71 C:\Users\user\...\IDM_64#U007e1.EXE.exe, PE32+ 14->71 dropped 107 Drops PE files to the document folder of the user 14->107 109 Found many strings related to Crypto-Wallets (likely being stolen) 14->109 111 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->111 117 3 other signatures 14->117 22 AppLaunch.exe 16 5 14->22         started        27 cmd.exe 1 14->27         started        113 Antivirus detection for dropped file 18->113 115 Multi AV Scanner detection for dropped file 18->115 signatures6 process7 dnsIp8 79 178.22.24.175, 4449, 49699, 49701 CLEVERNETWORK-ASNFR Switzerland 22->79 81 pastebin.com 172.66.171.73, 443, 49698 CLOUDFLARENETUS United States 22->81 63 C:\Users\...\executive_7839.858_INSTALL.exe, PE32 22->63 dropped 97 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 22->97 99 Protects its processes via BreakOnTermination flag 22->99 29 cmd.exe 1 22->29         started        32 reg.exe 1 1 27->32         started        34 conhost.exe 27->34         started        file9 signatures10 process11 signatures12 101 Suspicious powershell command line found 29->101 103 Bypasses PowerShell execution policy 29->103 36 powershell.exe 12 29->36         started        38 conhost.exe 29->38         started        105 Creates autostart registry keys with suspicious names 32->105 process13 process14 40 executive_7839.858_INSTALL.exe 2 36->40         started        file15 65 C:\Users\...\executive_7839.858_INSTALL.tmp, PE32 40->65 dropped 43 executive_7839.858_INSTALL.tmp 3 5 40->43         started        process16 file17 67 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 43->67 dropped 69 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 43->69 dropped 46 executive_7839.858_INSTALL.exe 2 43->46         started        process18 file19 73 C:\Users\...\executive_7839.858_INSTALL.tmp, PE32 46->73 dropped 49 executive_7839.858_INSTALL.tmp 5 16 46->49         started        process20 file21 55 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 49->55 dropped 57 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 49->57 dropped 59 C:\ProgramData\...\vcruntime140_1.dll (copy), PE32+ 49->59 dropped 61 11 other malicious files 49->61 dropped 52 FnHotkeyUtility.exe 501 49->52         started        process22 signatures23 93 Searches for specific processes (likely to inject) 52->93 95 Potentially malicious time measurement code found 52->95
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Kepavll
Status:
Malicious
First seen:
2025-09-20 07:04:01 UTC
File Type:
PE+ (Exe)
Extracted files:
8
AV detection:
25 of 36 (69.44%)
Threat level:
  5/5
Result
Malware family:
stormkitty
Score:
  10/10
Tags:
family:asyncrat family:stormkitty defense_evasion discovery execution installer persistence rat stealer upx
Behaviour
Checks SCSI registry key(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Command and Scripting Interpreter: PowerShell
Suspicious use of SetThreadContext
UPX packed file
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
ACProtect 1.3x - 1.4x DLL software
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
AsyncRat
Asyncrat family
StormKitty
StormKitty payload
Stormkitty family
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
f3a4b0da6aee356030a581a3423a43136821add76ba78f22455e5bc99b947c56
MD5 hash:
f8b4de48377048dae1a44ec5db2248df
SHA1 hash:
6c3de7926cd0e9cdf2ba4d81b6d4b6ddd3396e36
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:golang_duffcopy_amd64
Rule name:Golang_Find_CSC846
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:Golang_Find_CSC846_Simple
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Suspicious_Golang_Binary
Author:Tim Machac
Description:Triage: Golang-compiled binary with suspicious OS/persistence/network strings (not family-specific)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

StormKitty

Executable exe f3a4b0da6aee356030a581a3423a43136821add76ba78f22455e5bc99b947c56

(this sample)

Comments