General

  • Target

    1f2c72f6dc8280281f42c3acdd98c603f35a4ae6030de80ce1641b27ab9ee96d

  • Size

    201KB

  • Sample

    220804-lvgqmsefbj

  • MD5

    366ef4563060fcaca0bd77637f4521f1

  • SHA1

    5f3d5371fe0f421275258bfc1682f6966e54bfc4

  • SHA256

    1f2c72f6dc8280281f42c3acdd98c603f35a4ae6030de80ce1641b27ab9ee96d

  • SHA512

    41b34689ecf26cc19ebbc787964b038804d95e106f55531fa7239032942a2b55083ed7b0c50ef9be9ec9d8cca40affeb2484ff79a2dd6f22f7383c81079f2bad

Malware Config

Targets

    • Target

      1f2c72f6dc8280281f42c3acdd98c603f35a4ae6030de80ce1641b27ab9ee96d

    • Size

      201KB

    • MD5

      366ef4563060fcaca0bd77637f4521f1

    • SHA1

      5f3d5371fe0f421275258bfc1682f6966e54bfc4

    • SHA256

      1f2c72f6dc8280281f42c3acdd98c603f35a4ae6030de80ce1641b27ab9ee96d

    • SHA512

      41b34689ecf26cc19ebbc787964b038804d95e106f55531fa7239032942a2b55083ed7b0c50ef9be9ec9d8cca40affeb2484ff79a2dd6f22f7383c81079f2bad

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks