General

  • Target

    098765432345678987654.exe

  • Size

    1.7MB

  • Sample

    220822-m188hshge5

  • MD5

    ca6a0d1a61d47ca4b6e9ea29bb5a357a

  • SHA1

    890525244230e81fddf090a13b0502132626bcdf

  • SHA256

    d8c010b7d4e2b63ed74a680750f3671ba6674e9c51eb061e610f1ed72ba63f1e

  • SHA512

    380dc32bef3f12bbcb14d14340ebbfb362ce37d1e0e54e198236419a9ab4ddefa5f67ce9efc2061b5711aab91f95327d110f190fdf2f1741905807435746df35

  • SSDEEP

    24576:v/4W3tsHFhndhZYXQQtLWIPWIjBpikg6:ttYFhndhiXQQNHe

Malware Config

Targets

    • Target

      098765432345678987654.exe

    • Size

      1.7MB

    • MD5

      ca6a0d1a61d47ca4b6e9ea29bb5a357a

    • SHA1

      890525244230e81fddf090a13b0502132626bcdf

    • SHA256

      d8c010b7d4e2b63ed74a680750f3671ba6674e9c51eb061e610f1ed72ba63f1e

    • SHA512

      380dc32bef3f12bbcb14d14340ebbfb362ce37d1e0e54e198236419a9ab4ddefa5f67ce9efc2061b5711aab91f95327d110f190fdf2f1741905807435746df35

    • SSDEEP

      24576:v/4W3tsHFhndhZYXQQtLWIPWIjBpikg6:ttYFhndhiXQQNHe

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks