General

  • Target

    a1b3cb748176d91f760264b5349292eb.exe

  • Size

    958KB

  • Sample

    210714-yn8pge1nta

  • MD5

    a1b3cb748176d91f760264b5349292eb

  • SHA1

    0629209324566660c0bf6151b4a9a894cde4086e

  • SHA256

    8130e7cb38e727c9f90c9ec404685cffdff6c731d780ba7220af582cadadb30b

  • SHA512

    a4fceea10bfc252168624c765e668b43f57e54bc4f31759eb595db2597f0b2744c355e687ea65674d9e7d88edd9d7de12fc73a337d384a81e0e45316f6ca7d24

Malware Config

Targets

    • Target

      a1b3cb748176d91f760264b5349292eb.exe

    • Size

      958KB

    • MD5

      a1b3cb748176d91f760264b5349292eb

    • SHA1

      0629209324566660c0bf6151b4a9a894cde4086e

    • SHA256

      8130e7cb38e727c9f90c9ec404685cffdff6c731d780ba7220af582cadadb30b

    • SHA512

      a4fceea10bfc252168624c765e668b43f57e54bc4f31759eb595db2597f0b2744c355e687ea65674d9e7d88edd9d7de12fc73a337d384a81e0e45316f6ca7d24

    • A310logger

      A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty Payload

    • A310logger Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks