Unpacking KiwiStealer: Diving into BITTER APT’s Malware for File Exfiltration

Learn about KiwiStealer capabilities and malware analysis of how it exfiltrates data via HTTP POST requests.

Unpacking KiwiStealer: Diving into BITTER APT’s Malware for File Exfiltration

KiwiStealer is a file stealer that was first identified in 2024. The first report on the malware was posted on the platform ctfiot. Subsequent reporting from ThreatRay revealed that the malware was observed being used by the threat group Bitter APT in late 2024. The malware collects some system information before attempting to collect files from specific directories. This blog outlines the malware’s capabilities and how it exfiltrates data via HTTP POST requests. This overview includes:

  • Malware Analysis
  • Network Traffic Analysis
  • Recommendations
  • Indicators of Compromise (IOCs)
  • MITRE ATT&CK TTPs

Malware Analysis

Figure 1: Exfiltration Criteria used by KiwiStealer.

The file analyzed as part of this blog can be found on VirusTotal. The following table shows information about the sample, including hash values.

Figure 2: VirusTotal Results for the sample. Accurate as of August 13, 2025, at 10:29 EST. Source: VirusTotal

SHA256

4b62fc86273cdc424125a34d6142162000ab8b97190bf6af428d3599e4f4c175

SHA1

01ffdb013b7f6d96ca03b4270841e76bd06a86f2

MD5

fd5f2cf4b8df27f27dc2e6bddc1a7b2e

ssdeep

3072:O/eUfhyIrfMSELY36PGIjMDIqZ1jbS+AxsScaz6K+EavryQ:0xp9ELYKjMD9ZB+caT+Eav

File Size

178.00 KB

File Type

Win32 EXE

The malware collects the username and computer name, appending this information to the C2 URI and including it in HTTP requests to the C2 server. The URI is itself hardcoded within the malware and is decoded using string reversal and a modified Caesar Cipher (ROT2). The sample also created a mutex rabadaisunique, to ensure that multiple instances of the malware cannot be executed on a compromised host.

Figure 3: Hardcoded C2 URL that is obfuscated. Source: ThreatRay

KiwiStealer iterates through several directories to identify files that can be exfiltrated. These directories are shown in the screenshot below. 

Figure 4: Directories targeted by KiwiStealer. Source: ThreatRay

The malware will only exfiltrate files that are less than 50 MB in size and that have been modified in the last year. The file extensions that the malware targets are outlined in the table below.

.z7

.txt

.doc

.docx

.xls

.xlsx

.ppt

.pptx

.pdf

.rtf

.jpg

.zip

.rar

.apk

.neat

.err

.eln

.ppi

.er9

.azr

.pfx

.ovpn



After successfully extracting files, the malware appends the file name to a file called winlist.log along with the time it was exfiltrated. When the sample was detonated by a sandbox, two files were exfiltrated, and their names were added to winlist.log.

Figure 5: Winlist.log contains the list of files exfiltated.

Network Traffic Analysis

The PCAP for this sample is available on Any.Run.

The malware exfiltrates information to its C2 server via HTTP POST requests. The POST request returns files containing data about the file. The PCAP contains two POST requests. The requests are to the domain ebeninstallsvc[.]com, to the URI /uplh4ppy.php. The request to the domain includes the computer name and user name of the compromised host.

Figure 6: Traffic capture showing the hostname and username being passed as URI parameters.

WHOIS data for the domain ebeninstallsvc[.]com shows that it was registered with NameCheap on 2023-10-27 at 07:08:18 UTC. 

Figure 7: WHOIS data for the C2.

The first request sends back an RTF file titled 20240712_173213__ukdescribed.rtf to the server. If this file is successfully transmitted to the server, the C2 responds with the response line success.

Figure 8: RTF being sent to the C2 server.

This RTF document was stored on the desktop and exfiltrated by the malware. 

Figure 9: Content of the exfiltrated RTF file.

The second POST request sends back an image to the C2 server.

Figure 10: Network traffic showing the exfiltration of a jpg file.

The image can be decoded using CyberChef using the recipe shown in the screenshot below. The picture was extracted from the PCAP using the export functionality within Wireshark. 

💡
For more details on how to use CyberChef, please read our Tool Guide: CyberChef 101
Figure 11: Exfiltrated image rendered using CyberChef

A larger version of the image is shown below. This particular image was stored on the sandbox and exfiltrated by the malware. 

Figure 12: Exfiltrated Image

ThreatRay’s report also includes screenshots of other traffic associated with the malware. This particular screenshot contains information about the collected files. 

Figure 13: Additional files being exfiltrated by the malware. Source: ThreatRay

Conclusion

KiwiStealer is a malware that exfiltrates files from compromised machines. The malware targets a specific set of file extensions and only attempts to exfiltrate files that have been modified in the past year and are less than 50MB in size. Unlike other malware variants that have advanced capabilities, KiwiStealer is a relatively simple malware whose sole purpose is to exfiltrate files. 

Recommendations

Methods to mitigate the risks posed by malware such as KiwiStealer include:

  • Deploy EDR/AV solutions
    • EDR or AV solutions can detect malicious process chains and anomalous activity that may be indicative of a malware infection.
  • User Education
    • Users can help mitigate the risk of information-stealing malware infections by avoiding suspicious websites and using authorised software in corporate environments.

Indicators of Compromise

The table below contains a list of KiwiStealer network IOCs that have been identified and added to the Pulsedive platform. This data can be queried in Pulsedive using the Explore query threat="KiwiStealer" and is available for export in multiple formats (CSV, STIX 2.1, JSON).

KiwiStealer IOCs

ebeninstallsvc[.]com

hxxp=//ebeninstallsvc[.]com/uplh4ppy[.]php

MITRE ATT&CK TTPs

Technique

Tactic

Collection

Data from Local System (T1005)

Command and Control

Data Obfuscation (T1001)

Defense Evasion

Indicator Removal: File Deletion (T1070.004)

Obfuscated Files or Information (T1027)

Discovery

File and Directory Discovery (T1083)

System Information Discovery (T1082)

Execution

User Execution: Malicious File (T1204.002)

Exfiltration

Exfiltration Over C2 Channel (T1041)

References

The Bitter End: Unraveling Eight Years of Espionage Antics – Part Two | Threatray
In the second part of our research with Proofpoint, we take a comprehensive look at the Bitter espionage group, its malware payload arsenal, shared TTPs and provide IOCs and YARA rules .
APT-C-08(蔓灵花)组织新型攻击组件分析报告 | CTF导航
APT-C-08 蔓灵花APT-C-08(蔓灵花)是一个拥有南亚地区政府背景的APT组织,近几年来持续对南亚周边国家进行网络攻击活动,攻击目标涉及政府、军工、高校和驻外机构等企事业单位组织。近期,360安全大脑监测…