General

  • Target

    Revised shipment.pdf.tar

  • Size

    708KB

  • Sample

    220831-pvjrsafhd9

  • MD5

    a082ef1c0e9aafccd4885bb685eb999f

  • SHA1

    2019cce2c27755159a3b3d8faeb321d3458f5206

  • SHA256

    aac2f3890ef56925b86a147bea1ccb6489b7cf1e7e5ecbe40e6b0602d6aa8a14

  • SHA512

    14c551173b4f6ee046ef6158f3c2626270ee55c043f369ca1917aeb7ffc449766f7c3b6e1adce9ea7e73bc1d291609a33240e8f037fef47f4d4e08a571f54248

  • SSDEEP

    12288:rNTBQCM0OHM5LHtzIJ7eKkT1CFgJYaWIZZSwCinCSrtg6SKlpx:nTk+LRKkUItQOCgbLlpx

Malware Config

Targets

    • Target

      Revised shipment.pdf.exe

    • Size

      706KB

    • MD5

      f79203454fd766c8189d00c43cfc7485

    • SHA1

      fe44898d206f0b4ef9497e7b7b2e9dedcd4335aa

    • SHA256

      3909f1e1d41d36e0f62bd770841a0a8ea28c2b7d52f2e2fc77457538fbd7a291

    • SHA512

      2b88a745ec24591e5a5b28ade1470416a6bfe2bed86383c276736d0142ddae64bf985cd84772ac00512868f1741f3a7cab555a7a53f95eb5408a582d0fbb8ad1

    • SSDEEP

      12288:2NTBQCM0OHM5LHtzIJ7eKkT1CFgJYaWIZZSwCinCSrtg6SKlpx:oTk+LRKkUItQOCgbLlpx

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks