General

  • Target

    98d37790e570afd49b7a00192019f6c9e7c84e96069da4daa1b64a6cc88695a8

  • Size

    406KB

  • Sample

    220817-gs8zwsbdhj

  • MD5

    2bb1aa0fd3ba10b9da58570bdf755402

  • SHA1

    a31cb26e9cd88c0a26b576aa4f185ed5f5135fb4

  • SHA256

    98d37790e570afd49b7a00192019f6c9e7c84e96069da4daa1b64a6cc88695a8

  • SHA512

    2cba6e41ad6978ea4914e52823d1af6c0372933eba71bc7e2ad4fd732a8c4ed905418ec0f7507835bacc81121e9784703239a2ce429406e61fd3abfea4901356

  • SSDEEP

    6144:UvEN2U+T6i5LirrllHy4HUcMQY6pdrsX/:GENN+T5xYrllrU7QY6pGv

Malware Config

Targets

    • Target

      98d37790e570afd49b7a00192019f6c9e7c84e96069da4daa1b64a6cc88695a8

    • Size

      406KB

    • MD5

      2bb1aa0fd3ba10b9da58570bdf755402

    • SHA1

      a31cb26e9cd88c0a26b576aa4f185ed5f5135fb4

    • SHA256

      98d37790e570afd49b7a00192019f6c9e7c84e96069da4daa1b64a6cc88695a8

    • SHA512

      2cba6e41ad6978ea4914e52823d1af6c0372933eba71bc7e2ad4fd732a8c4ed905418ec0f7507835bacc81121e9784703239a2ce429406e61fd3abfea4901356

    • SSDEEP

      6144:UvEN2U+T6i5LirrllHy4HUcMQY6pdrsX/:GENN+T5xYrllrU7QY6pGv

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks