General

  • Target

    495edc6456f3c1d7dcdf839ec8a1fc70.exe

  • Size

    935KB

  • Sample

    210713-wrpxr4awfa

  • MD5

    495edc6456f3c1d7dcdf839ec8a1fc70

  • SHA1

    fe30c475e506a76be7ea15c4f529938062718276

  • SHA256

    3504fe4b0e2d093c366cffa43ceb37026d7a5f8e35498aa7945556c77ecce731

  • SHA512

    b2122cd4b6a1b1f46f8e3b970ccd786ca6a07a554772a7ddebab9d7dc42ea7a12288debdccc3ec5af63fd6d707b3e804e3e13cfd2d4fbe7e2aec11abea4e1b1a

Malware Config

Targets

    • Target

      495edc6456f3c1d7dcdf839ec8a1fc70.exe

    • Size

      935KB

    • MD5

      495edc6456f3c1d7dcdf839ec8a1fc70

    • SHA1

      fe30c475e506a76be7ea15c4f529938062718276

    • SHA256

      3504fe4b0e2d093c366cffa43ceb37026d7a5f8e35498aa7945556c77ecce731

    • SHA512

      b2122cd4b6a1b1f46f8e3b970ccd786ca6a07a554772a7ddebab9d7dc42ea7a12288debdccc3ec5af63fd6d707b3e804e3e13cfd2d4fbe7e2aec11abea4e1b1a

    • A310logger

      A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty Payload

    • A310logger Executable

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks