General

  • Target

    SWIFT IMG_2022082__000021001.pdf.exe

  • Size

    22KB

  • Sample

    220824-qacneadfgj

  • MD5

    20a84bfdd16cd3e1b6849ea1ea9c4d0a

  • SHA1

    66082f545e8c54c3574aa21c09cc2cafeddc6c59

  • SHA256

    a68672b1ebb95bb719b551cbc3b72c53d5e256004c519039dc02649ff166b4da

  • SHA512

    120d7792ccf28a54b59e62e7e592facd4c7b5247978b6224694aa9be53a36bfb9b258feee87148f750b44d8359b699acb6176f5e8bce9d302a7c1d17bb84e5c8

  • SSDEEP

    192:2f+zZKZFq3WFjLpeBYY8zyfCCZtdT4NYHefn3Z2FT9TDvtAE230ZckEDt3ECJ:TzUZVFYBt8z3C2+Hef4ddBZA0Zva0C

Malware Config

Targets

    • Target

      SWIFT IMG_2022082__000021001.pdf.exe

    • Size

      22KB

    • MD5

      20a84bfdd16cd3e1b6849ea1ea9c4d0a

    • SHA1

      66082f545e8c54c3574aa21c09cc2cafeddc6c59

    • SHA256

      a68672b1ebb95bb719b551cbc3b72c53d5e256004c519039dc02649ff166b4da

    • SHA512

      120d7792ccf28a54b59e62e7e592facd4c7b5247978b6224694aa9be53a36bfb9b258feee87148f750b44d8359b699acb6176f5e8bce9d302a7c1d17bb84e5c8

    • SSDEEP

      192:2f+zZKZFq3WFjLpeBYY8zyfCCZtdT4NYHefn3Z2FT9TDvtAE230ZckEDt3ECJ:TzUZVFYBt8z3C2+Hef4ddBZA0Zva0C

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks