General

  • Target

    Revised Order.exe

  • Size

    719KB

  • Sample

    220812-g92xxahgar

  • MD5

    b08e56476b8ff662883f5774c842c94b

  • SHA1

    4d4f8efd50e314753ce3196d843de956cf0db10a

  • SHA256

    6566cde4ba73cc0316c3de8c2c23c90aa6f76bd4d824d45b5b5c1d23d2655d16

  • SHA512

    10b6fb1979044f7e34242943a8e0a85358feeb5df942542afd6d4e519ab19ee1be10fe6bc283009b2c5242f83f45c5897a11da69ae3cd98c7856997caa553df7

Malware Config

Targets

    • Target

      Revised Order.exe

    • Size

      719KB

    • MD5

      b08e56476b8ff662883f5774c842c94b

    • SHA1

      4d4f8efd50e314753ce3196d843de956cf0db10a

    • SHA256

      6566cde4ba73cc0316c3de8c2c23c90aa6f76bd4d824d45b5b5c1d23d2655d16

    • SHA512

      10b6fb1979044f7e34242943a8e0a85358feeb5df942542afd6d4e519ab19ee1be10fe6bc283009b2c5242f83f45c5897a11da69ae3cd98c7856997caa553df7

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks