General

  • Target

    TT09099.exe

  • Size

    252KB

  • Sample

    210525-yfkktm1njx

  • MD5

    3b376a64c278d40ce6e50a4fdc9b2022

  • SHA1

    0592e33cdedf18068de9d8350a2181ef711a0ba3

  • SHA256

    51d10bac8aff735f5f365f2ca016a039f9b2c8cabb4e42dca90ab06c13180746

  • SHA512

    0bbfd6cc70ec6cfc4218e5d853171578bcf0e36b7b08ba7598b5d52346437dd0c95df09f077099da4fac859f2986dc6caea6242dfaf44acfc6bd87537e0129d0

Malware Config

Targets

    • Target

      TT09099.exe

    • Size

      252KB

    • MD5

      3b376a64c278d40ce6e50a4fdc9b2022

    • SHA1

      0592e33cdedf18068de9d8350a2181ef711a0ba3

    • SHA256

      51d10bac8aff735f5f365f2ca016a039f9b2c8cabb4e42dca90ab06c13180746

    • SHA512

      0bbfd6cc70ec6cfc4218e5d853171578bcf0e36b7b08ba7598b5d52346437dd0c95df09f077099da4fac859f2986dc6caea6242dfaf44acfc6bd87537e0129d0

    • A310logger

      A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty Payload

    • A310logger Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks