General

  • Target

    e-dekont.exe

  • Size

    1.9MB

  • Sample

    220824-ta3rdaffcr

  • MD5

    ada986026c468dd80925e205aa84a0ac

  • SHA1

    d3e9594b6532a9c1aeb1790d51d4f4d11e6e62a9

  • SHA256

    b44fca03a737dabed36acbe2a42cac044fb33e5571a919c669926b1aba3f4150

  • SHA512

    8ccc8538ae07bef283cbf7ff0bfeecba552aa057330215f3f2533ada449c205ced2e1066be340a6df85d98327ff14a6242ffa5ec21ce9b4a2fa56ba67d05d4e3

  • SSDEEP

    12288:tsK9j7OYmHvTvOJeA6iUitUG1dtKI67jEhuCqgpxAebAQGOYRqP2lU+5IwVK8vwo:/y6JeXGVvZhZYRqOl5Iu0FDRa5+7VO

Malware Config

Targets

    • Target

      e-dekont.exe

    • Size

      1.9MB

    • MD5

      ada986026c468dd80925e205aa84a0ac

    • SHA1

      d3e9594b6532a9c1aeb1790d51d4f4d11e6e62a9

    • SHA256

      b44fca03a737dabed36acbe2a42cac044fb33e5571a919c669926b1aba3f4150

    • SHA512

      8ccc8538ae07bef283cbf7ff0bfeecba552aa057330215f3f2533ada449c205ced2e1066be340a6df85d98327ff14a6242ffa5ec21ce9b4a2fa56ba67d05d4e3

    • SSDEEP

      12288:tsK9j7OYmHvTvOJeA6iUitUG1dtKI67jEhuCqgpxAebAQGOYRqP2lU+5IwVK8vwo:/y6JeXGVvZhZYRqOl5Iu0FDRa5+7VO

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Drops startup file

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks