General

  • Target

    Revised shipment.pdf.exe

  • Size

    706KB

  • Sample

    220805-nesjbahgcp

  • MD5

    f79203454fd766c8189d00c43cfc7485

  • SHA1

    fe44898d206f0b4ef9497e7b7b2e9dedcd4335aa

  • SHA256

    3909f1e1d41d36e0f62bd770841a0a8ea28c2b7d52f2e2fc77457538fbd7a291

  • SHA512

    2b88a745ec24591e5a5b28ade1470416a6bfe2bed86383c276736d0142ddae64bf985cd84772ac00512868f1741f3a7cab555a7a53f95eb5408a582d0fbb8ad1

Malware Config

Targets

    • Target

      Revised shipment.pdf.exe

    • Size

      706KB

    • MD5

      f79203454fd766c8189d00c43cfc7485

    • SHA1

      fe44898d206f0b4ef9497e7b7b2e9dedcd4335aa

    • SHA256

      3909f1e1d41d36e0f62bd770841a0a8ea28c2b7d52f2e2fc77457538fbd7a291

    • SHA512

      2b88a745ec24591e5a5b28ade1470416a6bfe2bed86383c276736d0142ddae64bf985cd84772ac00512868f1741f3a7cab555a7a53f95eb5408a582d0fbb8ad1

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks