Imperial Kitten
Repository Navigation
- Actor workbench: Imperial Kitten
- TTP-to-detection matrix: all mapped techniques
- Surface and capability routes: Endpoint RMM, Scripting, And User-Path Execution; Email, Cloud-Service, IMAP, And DNS C2
- Detection status: dashboard
- Hunt workflow: hunt workflow
- ATT&CK mappings: T1189 Drive-by Compromise (M2); T1071.003 Mail Protocols (M3); T1059.005 Visual Basic (M2)
- Mapped detections: None currently mapped.
- Mapped hunts: None currently mapped.
- IOC reference sources: None currently mapped.
- Tool detail pages:
IMAPLoader;StandardKeyboard - Tool matrix: all actor-linked tools (2 mapped tool row(s))
- Evidence records:
EVD-018/CLM-IMPERIALKITTEN-001 - Imported research intakes: None currently mapped.
- Intel update candidates: 1 current candidate(s)
- Source IDs in structured data:
SRC-CS-IMPERIAL-KITTEN-2023,SRC-PWC-YELLOW-LIDERC-2023
Imperial Kitten
Aliases: Imperial Kitten (CrowdStrike), Yellow Liderc (PwC), Tortoiseshell / Tortoise Shell (Symantec / Microsoft reporting), TA456 (Proofpoint), CURIUM / Crimson Sandstorm (Microsoft / MITRE ATT&CK).
Assessed sponsor: IRGC-aligned in public reporting. The current repository assessment does not resolve the actor to IRGC-CEC or IRGC-IO because reviewed primary public reporting does not support a branch-level sponsor call.
Relevance
Imperial Kitten is high priority for Israeli government and public-sector defenders because public reporting describes targeting of Israeli or Israel-adjacent transportation, maritime, logistics, and technology environments. Those sectors intersect with ports, customs-adjacent suppliers, municipal logistics dependencies, emergency movement, and critical national supply-chain operations.
Defensive Focus
- Strategic web compromise of Israeli or Israel-adjacent logistics and transportation websites.
- IMAP/IMAPS command and control from non-mail-client processes.
- Office/XLL delivery chains that lead to native C# compilation with
csc.exe. - AppDomain Manager Injection and unexpected managed-code execution under
AppVStreamingUX.exe. - Consumer or commodity mail-provider traffic from hosts that do not normally use IMAP.
Associated Tooling
- IMAPLoader: .NET downloader/loader using IMAP-based tasking and payload retrieval through legitimate or compromised email accounts.
- StandardKeyboard: Reported in public vendor analysis as an email-C2 aligned implant; keep sample-specific details tied to the primary report used for the claim.
- Discord API-based RAT: Reported by CrowdStrike as asynchronous C2 over a legitimate messaging service.
Detection Ideas
- Non-mail-client process establishes repeated outbound connections to TCP/143 or TCP/993, especially from servers, developer workstations, or
AppVStreamingUX.exe. - Office or Excel/XLL process spawns
csc.exe, followed by execution of a newly compiled DLL or managed payload. - Scheduled task or Run-key persistence appears with naming similar to media or streaming update components on a host that recently executed an Office/XLL chain.
- User visits an Israeli logistics or transportation site and then downloads/executes content that diverges from normal website behavior.
- DNS/proxy telemetry shows commodity mail or Discord API usage from non-browser/non-mail processes in sensitive logistics or public-sector networks.
Analytic Caution
Current primary-source review supports strong 2022-2023 Israeli transportation/logistics relevance and preserves a gap for specific 2024-2025 Israeli incidents under this exact alias set. Do not represent 2024-2025 Israel-specific activity as confirmed without an added primary source.
Repository Sources
SRC-CS-IMPERIAL-KITTEN-2023: CrowdStrike Imperial Kitten reporting.SRC-PWC-YELLOW-LIDERC-2023: PwC Yellow Liderc / IMAPLoader reporting.SRC-MITRE-G1012: MITRE ATT&CK CURIUM / Crimson Sandstorm profile.