General

  • Target

    984-63-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • Sample

    220906-lysbjsgbhm

  • MD5

    df5c20d0d6be13aa4412d0ad5da0ee74

  • SHA1

    fb939c9c76b403ad9b8af0489a9ab391b5b86296

  • SHA256

    caa35b4c21e4699fc29779b506d16742297d07026f48a6d3db435890d7d8a02a

  • SHA512

    50f8197a83daf35cbe54f9e6fa8628fe12df48f797fdc43928688d23e3b09b681762dfb616a6e89f83f31a513f410dc811937ddb5185a04727e10dfb75b6ec31

  • SSDEEP

    1536:Ig/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoViou1jF+AQI/8hjE7q0:IMZTkLfhjFSiO3o+X1eA7q0

Malware Config

Targets

    • Target

      984-63-0x0000000000400000-0x0000000000424000-memory.dmp

    • Size

      144KB

    • MD5

      df5c20d0d6be13aa4412d0ad5da0ee74

    • SHA1

      fb939c9c76b403ad9b8af0489a9ab391b5b86296

    • SHA256

      caa35b4c21e4699fc29779b506d16742297d07026f48a6d3db435890d7d8a02a

    • SHA512

      50f8197a83daf35cbe54f9e6fa8628fe12df48f797fdc43928688d23e3b09b681762dfb616a6e89f83f31a513f410dc811937ddb5185a04727e10dfb75b6ec31

    • SSDEEP

      1536:Ig/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoViou1jF+AQI/8hjE7q0:IMZTkLfhjFSiO3o+X1eA7q0

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks