General

  • Target

    Doc899780979080888.pdf.exe

  • Size

    710KB

  • Sample

    220727-gsk8tsahbp

  • MD5

    1156288fa7b4504d394e7006ce7eb902

  • SHA1

    75225ebadb39e96e97c5a0c859ae6044f873a524

  • SHA256

    1d9598ad9d7e41bd0513c7d263c805fb0598f18c7c69e3997bd109c1e058f212

  • SHA512

    92a7cdb3242dad94e9f0c2bcb72cfeec17817e98c7485798e572a2cac8cf3ad48e069f425a03684fa9705c53332dee3433cc358b89da43103fb9bf0cf4457076

Malware Config

Targets

    • Target

      Doc899780979080888.pdf.exe

    • Size

      710KB

    • MD5

      1156288fa7b4504d394e7006ce7eb902

    • SHA1

      75225ebadb39e96e97c5a0c859ae6044f873a524

    • SHA256

      1d9598ad9d7e41bd0513c7d263c805fb0598f18c7c69e3997bd109c1e058f212

    • SHA512

      92a7cdb3242dad94e9f0c2bcb72cfeec17817e98c7485798e572a2cac8cf3ad48e069f425a03684fa9705c53332dee3433cc358b89da43103fb9bf0cf4457076

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks