General

  • Target

    SWIFT IMG_2022082__000021001.pdf.exe

  • Size

    32KB

  • Sample

    220826-g7rddshed7

  • MD5

    89b50d1a3235605ef9d41c853dc836a1

  • SHA1

    e95e06a65f58ad79f18703b9d7e4c368b3cb4111

  • SHA256

    7b8c63fc9564c82db7c23fcf523fea4e7e69de4ef7dbc5c2b3bb06a7491b4f26

  • SHA512

    5c92abc9c10bd5508fbdbfc7556ade8f48126e974952c71f08c39fb572d9fc4508c2f72496e4b5f64ce6fc6e440d30f9fab65c91321fa0232d85071ba81244bc

  • SSDEEP

    768:cYEFJv2nurSZxASYvuT+/mz3PcefI/A57:Q3unumASYvuumz3Pnf9d

Malware Config

Targets

    • Target

      SWIFT IMG_2022082__000021001.pdf.exe

    • Size

      32KB

    • MD5

      89b50d1a3235605ef9d41c853dc836a1

    • SHA1

      e95e06a65f58ad79f18703b9d7e4c368b3cb4111

    • SHA256

      7b8c63fc9564c82db7c23fcf523fea4e7e69de4ef7dbc5c2b3bb06a7491b4f26

    • SHA512

      5c92abc9c10bd5508fbdbfc7556ade8f48126e974952c71f08c39fb572d9fc4508c2f72496e4b5f64ce6fc6e440d30f9fab65c91321fa0232d85071ba81244bc

    • SSDEEP

      768:cYEFJv2nurSZxASYvuT+/mz3PcefI/A57:Q3unumASYvuumz3Pnf9d

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks