General

  • Target

    9d7cb550c366b91e89384152462bc655.exe

  • Size

    132KB

  • Sample

    220816-h54rdagfg6

  • MD5

    9d7cb550c366b91e89384152462bc655

  • SHA1

    503f7fbcfc11e364378d085a3f10d212b00d2b66

  • SHA256

    3704c9065de2c596066dbca893c63b1d12b9264d62cffd92ffc49aaf919b49a5

  • SHA512

    058832e14bceb6d2fc66f4a59f93507c88e509c2eaaf9680e342a86074c9da3ca6b7cbed5c18da98c16d30527f9c779c62979f752309b33a013275b73963343d

Malware Config

Targets

    • Target

      9d7cb550c366b91e89384152462bc655.exe

    • Size

      132KB

    • MD5

      9d7cb550c366b91e89384152462bc655

    • SHA1

      503f7fbcfc11e364378d085a3f10d212b00d2b66

    • SHA256

      3704c9065de2c596066dbca893c63b1d12b9264d62cffd92ffc49aaf919b49a5

    • SHA512

      058832e14bceb6d2fc66f4a59f93507c88e509c2eaaf9680e342a86074c9da3ca6b7cbed5c18da98c16d30527f9c779c62979f752309b33a013275b73963343d

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks