General

  • Target

    0900900000000TTU.exe

  • Size

    397KB

  • Sample

    210713-ceyxsh8eyx

  • MD5

    553970a3cc2107922b3c29ececbd11e3

  • SHA1

    75e5109e14865976612cbe77023237a0e6321094

  • SHA256

    6dd6430d675baddc598fa38532e9d4572d5dac63429d599871912b2ad1cc51cc

  • SHA512

    e88a76a266b941d830bbd1fbba698d4b70fec26b71962c77df2ae2457d0ea7f59c905b9413595185c5720436255e7bc0a76711be0b65435d6ed89ddd07e24bdc

Malware Config

Targets

    • Target

      0900900000000TTU.exe

    • Size

      397KB

    • MD5

      553970a3cc2107922b3c29ececbd11e3

    • SHA1

      75e5109e14865976612cbe77023237a0e6321094

    • SHA256

      6dd6430d675baddc598fa38532e9d4572d5dac63429d599871912b2ad1cc51cc

    • SHA512

      e88a76a266b941d830bbd1fbba698d4b70fec26b71962c77df2ae2457d0ea7f59c905b9413595185c5720436255e7bc0a76711be0b65435d6ed89ddd07e24bdc

    • A310logger

      A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty Payload

    • A310logger Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks