General

  • Target

    NewXOrder.xlsm

  • Size

    42KB

  • Sample

    220815-hms7xsfeer

  • MD5

    1f972129c268128a9e63b03f166cd65a

  • SHA1

    e19b5eed24f6d881338793e9f7218ff99c1d7981

  • SHA256

    b80d30b287b4ba5c153bac042a1a9eec6d746181b893717cbcb05ed3180d8d71

  • SHA512

    421fc17d3bb396d84907190a46df51851ddfafc7549e15f728f4a549d27f9fe2ab2723e0126599f260c58a3e165a5e128cc677a0cdeb7839e3e7e39ac6a0d90b

Malware Config

Targets

    • Target

      NewXOrder.xlsm

    • Size

      42KB

    • MD5

      1f972129c268128a9e63b03f166cd65a

    • SHA1

      e19b5eed24f6d881338793e9f7218ff99c1d7981

    • SHA256

      b80d30b287b4ba5c153bac042a1a9eec6d746181b893717cbcb05ed3180d8d71

    • SHA512

      421fc17d3bb396d84907190a46df51851ddfafc7549e15f728f4a549d27f9fe2ab2723e0126599f260c58a3e165a5e128cc677a0cdeb7839e3e7e39ac6a0d90b

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks