General

  • Target

    93099d7605c84c5fcbd45ec0e6b4210c20a4ac7194680de845116b9af0286d2d

  • Size

    152KB

  • Sample

    220804-l58bcaegbm

  • MD5

    3218a6b674d56aff678ef803ac3b7b57

  • SHA1

    180c1091753861286f391d1b4cf5d4c80333e762

  • SHA256

    93099d7605c84c5fcbd45ec0e6b4210c20a4ac7194680de845116b9af0286d2d

  • SHA512

    198e0c0a03761301248511bac393a2722b05bf32f6351b2baea9f363f67226c5981ed39cfb091daa77aed862b973bd11e35a0a4cde1e74dca8c865cde0141618

Malware Config

Targets

    • Target

      93099d7605c84c5fcbd45ec0e6b4210c20a4ac7194680de845116b9af0286d2d

    • Size

      152KB

    • MD5

      3218a6b674d56aff678ef803ac3b7b57

    • SHA1

      180c1091753861286f391d1b4cf5d4c80333e762

    • SHA256

      93099d7605c84c5fcbd45ec0e6b4210c20a4ac7194680de845116b9af0286d2d

    • SHA512

      198e0c0a03761301248511bac393a2722b05bf32f6351b2baea9f363f67226c5981ed39cfb091daa77aed862b973bd11e35a0a4cde1e74dca8c865cde0141618

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks