General

  • Target

    Payment Slip_CityBank010922.exe

  • Size

    230KB

  • Sample

    220902-qg8pesgge6

  • MD5

    12efd73394350c0076c6839c475a8821

  • SHA1

    2f62d39d5742fa95e49b1cffce09bcf0b5638993

  • SHA256

    9ccd495500c30bd78504986105407a90a33189abba44925eb0877b494693026c

  • SHA512

    45c48509945314723844fc6af2e528121c3b7ded541ffe79106ea70540556269afcb26720b52559d8677425fc7a0f460abba6f5dd138580bf5ea1795a0fdac11

  • SSDEEP

    3072:nTN/T7gqPHIvuvHQFpaIYkKEPIFJzE17vte:F5VHsaIYkb

Malware Config

Targets

    • Target

      Payment Slip_CityBank010922.exe

    • Size

      230KB

    • MD5

      12efd73394350c0076c6839c475a8821

    • SHA1

      2f62d39d5742fa95e49b1cffce09bcf0b5638993

    • SHA256

      9ccd495500c30bd78504986105407a90a33189abba44925eb0877b494693026c

    • SHA512

      45c48509945314723844fc6af2e528121c3b7ded541ffe79106ea70540556269afcb26720b52559d8677425fc7a0f460abba6f5dd138580bf5ea1795a0fdac11

    • SSDEEP

      3072:nTN/T7gqPHIvuvHQFpaIYkKEPIFJzE17vte:F5VHsaIYkb

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks