General

  • Target

    5

  • Size

    891KB

  • Sample

    220902-ncejnsfcb8

  • MD5

    fc5989f3d22dbbdecea721a3a149a584

  • SHA1

    3d590bf3e2bcb6b6fb8d706421048793c1c3a295

  • SHA256

    4346e1523a778cd8a6a7a63a57668b6b14d238db58a0c9a43589533bbf183773

  • SHA512

    1441802146f4d3bd4f93a0d732fff7765e58bdcf7e8088270fb839a793b27839dab23e2781c2d5d281b0471c5e2b6a35aa7fa08808d1e343dd66d9d3a9f3db84

  • SSDEEP

    24576:CZ5KTFD1E9g8V3Ee9Y5+CEm6pUXY+mzo3bv:E5KTFDka+i6glmzM

Malware Config

Targets

    • Target

      5

    • Size

      891KB

    • MD5

      fc5989f3d22dbbdecea721a3a149a584

    • SHA1

      3d590bf3e2bcb6b6fb8d706421048793c1c3a295

    • SHA256

      4346e1523a778cd8a6a7a63a57668b6b14d238db58a0c9a43589533bbf183773

    • SHA512

      1441802146f4d3bd4f93a0d732fff7765e58bdcf7e8088270fb839a793b27839dab23e2781c2d5d281b0471c5e2b6a35aa7fa08808d1e343dd66d9d3a9f3db84

    • SSDEEP

      24576:CZ5KTFD1E9g8V3Ee9Y5+CEm6pUXY+mzo3bv:E5KTFDka+i6glmzM

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks