General

  • Target

    Request For Quotation And Sample.pdf.exe

  • Size

    188KB

  • Sample

    220726-rtspeaadfj

  • MD5

    c5fac65456d0cf57baa56f43b6935ac6

  • SHA1

    f0128eb5a26160c60a5f41cf1987b34456f21e4c

  • SHA256

    e020b424ea22cc6206b882a18f6d1e5e39499982e96bc2dfc9bd461e03d40149

  • SHA512

    602d4cba9760f5592dfb19fe25eba9fcdb15717977404c602bb56e44e887a3823243a8cf33dfa0f86c217b8289840040cc92d41c19e7424be38269774ab051cd

Malware Config

Targets

    • Target

      Request For Quotation And Sample.pdf.exe

    • Size

      188KB

    • MD5

      c5fac65456d0cf57baa56f43b6935ac6

    • SHA1

      f0128eb5a26160c60a5f41cf1987b34456f21e4c

    • SHA256

      e020b424ea22cc6206b882a18f6d1e5e39499982e96bc2dfc9bd461e03d40149

    • SHA512

      602d4cba9760f5592dfb19fe25eba9fcdb15717977404c602bb56e44e887a3823243a8cf33dfa0f86c217b8289840040cc92d41c19e7424be38269774ab051cd

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks