General

  • Target

    812-63-0x0000000000400000-0x0000000000425000-memory.dmp

  • Size

    148KB

  • Sample

    220905-pz4yhsbgh6

  • MD5

    df297b7d37420951d84527e03d84b875

  • SHA1

    9e8cb0c3f76e1b3f18ad0990a9666bb74298469b

  • SHA256

    0bc2a4f1cac47c364ca35ed978d1d34d15546c5d499247e53f94b487f746dd03

  • SHA512

    9d3ddcd254f37c74b2e9690ad726b3243049b1988e71794d6a759f7267bd73666a4cb46abffa37e6745e9e5d62a1fe32a3df522e73ee63c8971464ec8733d040

  • SSDEEP

    1536:LH7w/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoVioMZYCM99l8INLE2d7tXQQC:LHgZTkLfhjFSiO3o6ZYC7C/dS

Malware Config

Targets

    • Target

      812-63-0x0000000000400000-0x0000000000425000-memory.dmp

    • Size

      148KB

    • MD5

      df297b7d37420951d84527e03d84b875

    • SHA1

      9e8cb0c3f76e1b3f18ad0990a9666bb74298469b

    • SHA256

      0bc2a4f1cac47c364ca35ed978d1d34d15546c5d499247e53f94b487f746dd03

    • SHA512

      9d3ddcd254f37c74b2e9690ad726b3243049b1988e71794d6a759f7267bd73666a4cb46abffa37e6745e9e5d62a1fe32a3df522e73ee63c8971464ec8733d040

    • SSDEEP

      1536:LH7w/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoVioMZYCM99l8INLE2d7tXQQC:LHgZTkLfhjFSiO3o6ZYC7C/dS

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks