General

  • Target

    f7e5a5c100fcf5a248dfe0424bc5bbdc.exe

  • Size

    132KB

  • Sample

    220809-w4bk4afhe8

  • MD5

    f7e5a5c100fcf5a248dfe0424bc5bbdc

  • SHA1

    05fab29b3f901ea56ebc0d5e240aa747aa44ee4f

  • SHA256

    fafa8057f024c7a3c30e48b63d05d712e7de1f2f38f592a03cabbe8917942a89

  • SHA512

    048b661425a63033980b1253bd0e8e24de0eb6ea230e24c46eec965371cd74f7ebd27ae004f6ee006abb48879fa3258ff6d4d049380ea8da57cda5953fb91bf2

Malware Config

Targets

    • Target

      f7e5a5c100fcf5a248dfe0424bc5bbdc.exe

    • Size

      132KB

    • MD5

      f7e5a5c100fcf5a248dfe0424bc5bbdc

    • SHA1

      05fab29b3f901ea56ebc0d5e240aa747aa44ee4f

    • SHA256

      fafa8057f024c7a3c30e48b63d05d712e7de1f2f38f592a03cabbe8917942a89

    • SHA512

      048b661425a63033980b1253bd0e8e24de0eb6ea230e24c46eec965371cd74f7ebd27ae004f6ee006abb48879fa3258ff6d4d049380ea8da57cda5953fb91bf2

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks