General

  • Target

    1736-61-0x0000000000400000-0x0000000000421000-memory.dmp

  • Size

    132KB

  • Sample

    220901-l8w3gseag7

  • MD5

    0396c5b0a9bce41e7ee1040070600a4e

  • SHA1

    be51b6e27d3ff9eec578f4ae916038b84f3a64d9

  • SHA256

    34df23156bed123d9fa7e52de2d1dedbf12d542f4bea0686e58ef284a8447eb2

  • SHA512

    3625d276efbf099f32657d0453b42e3826bc84894787e9cc57ebd4472a6988010e9f495d7081893a299f77eaf0e4de371974d85ee3d1b0dc01019820876fed63

  • SSDEEP

    1536:iks/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoViocI6VPTHBQTvpO:iTZTkLfhjFSiO3oyI6f2

Malware Config

Targets

    • Target

      1736-61-0x0000000000400000-0x0000000000421000-memory.dmp

    • Size

      132KB

    • MD5

      0396c5b0a9bce41e7ee1040070600a4e

    • SHA1

      be51b6e27d3ff9eec578f4ae916038b84f3a64d9

    • SHA256

      34df23156bed123d9fa7e52de2d1dedbf12d542f4bea0686e58ef284a8447eb2

    • SHA512

      3625d276efbf099f32657d0453b42e3826bc84894787e9cc57ebd4472a6988010e9f495d7081893a299f77eaf0e4de371974d85ee3d1b0dc01019820876fed63

    • SSDEEP

      1536:iks/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoViocI6VPTHBQTvpO:iTZTkLfhjFSiO3oyI6f2

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks