General

  • Target

    1440-67-0x0000000000400000-0x0000000000425000-memory.dmp

  • Size

    148KB

  • Sample

    220815-lm928abgg7

  • MD5

    ee33905972158ec063901eedea351816

  • SHA1

    0019af911d58e5b00e6e4f80ee5b90c14cc6b8bd

  • SHA256

    dc513d0a1d8a81d37e04bbdc32768bb5c6caaccc7ab1db4172b5461f7e1db9f4

  • SHA512

    a425f49ad22baeb3d2d982504a94ff86a5ea234606c875bf7679e0b91911ae45bb1b525a66c30709a1cdcec5273b1e803a31bff97e575d5d118c0ad29492709b

Malware Config

Targets

    • Target

      1440-67-0x0000000000400000-0x0000000000425000-memory.dmp

    • Size

      148KB

    • MD5

      ee33905972158ec063901eedea351816

    • SHA1

      0019af911d58e5b00e6e4f80ee5b90c14cc6b8bd

    • SHA256

      dc513d0a1d8a81d37e04bbdc32768bb5c6caaccc7ab1db4172b5461f7e1db9f4

    • SHA512

      a425f49ad22baeb3d2d982504a94ff86a5ea234606c875bf7679e0b91911ae45bb1b525a66c30709a1cdcec5273b1e803a31bff97e575d5d118c0ad29492709b

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks