General

  • Target

    SecuriteInfo.com.W32.AIDetectNet.01.4201.5348

  • Size

    31KB

  • Sample

    220826-mtds2accf8

  • MD5

    993af3de9afbbf18492a7624dc1520d0

  • SHA1

    ffbbb6e36177177f00641f248e0a597d14d5a860

  • SHA256

    519049c140f5a4f0d6d2115f921d105b1bd4bf46f2e9f66a45762ba5c9cda9e0

  • SHA512

    c59274fce6b8a066a6b38988dd159ef09d964bdce7457f18da481e21a70bffa636411b5e386abf23c27c5a494d5a7bbe1ec4a0548f6f22977d59b682632b285a

  • SSDEEP

    768:6XaPBXOLr3u9Ngw1MYwVL6nXfelWhl9lqSg6KJY6Zy:6XaJ+ZkMP6nXcWhl9lqS3Kfy

Malware Config

Targets

    • Target

      SecuriteInfo.com.W32.AIDetectNet.01.4201.5348

    • Size

      31KB

    • MD5

      993af3de9afbbf18492a7624dc1520d0

    • SHA1

      ffbbb6e36177177f00641f248e0a597d14d5a860

    • SHA256

      519049c140f5a4f0d6d2115f921d105b1bd4bf46f2e9f66a45762ba5c9cda9e0

    • SHA512

      c59274fce6b8a066a6b38988dd159ef09d964bdce7457f18da481e21a70bffa636411b5e386abf23c27c5a494d5a7bbe1ec4a0548f6f22977d59b682632b285a

    • SSDEEP

      768:6XaPBXOLr3u9Ngw1MYwVL6nXfelWhl9lqSg6KJY6Zy:6XaJ+ZkMP6nXcWhl9lqS3Kfy

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks