General

  • Target

    SP SOLICITAR OFERTA 2022-SEPT xlxs(78KB).img.zip

  • Size

    125KB

  • Sample

    220907-kzhytsbeb6

  • MD5

    388b00d9115eb34ea767aa481c582a95

  • SHA1

    7e62a90918ebc80ed8fb9890698b2f988c646816

  • SHA256

    92fbc4eb738918fe5ffa5e4e78f0c37242480906b4711cb900eaef7f8c1b3df5

  • SHA512

    699806f48f6a1b44c6d601779fd898c9542d0176363ac8c37ede963992b627d928c38076dbfd3d1c749707862a2c7bad028150c33ff41a51e52ee893103b1131

  • SSDEEP

    3072:QYIkqwJV1m6hgdGhxkUi7fnpQI7hpeUL29W:QOV1m6hgdGQUiDnC3USw

Malware Config

Targets

    • Target

      SP SOLICITAR OFERTA 2022-SEPT.xlxs(78KB).exe

    • Size

      161KB

    • MD5

      15c9f1c169e3c865751bfd982558764f

    • SHA1

      2da54d454e1465d475308604fc1fdd1e05f47a86

    • SHA256

      cfcd7de22c049bdefa98959de3072b2bfc12e280193d43e4749a84e48ba665b6

    • SHA512

      319096edbf164999491ee4d533d5e3a6d62a43695752d1265bf20bffef64ea6da64d1ff6cce87711ce9b86046132087c2daba72802b8326e8fca2a6a6bad4d24

    • SSDEEP

      3072:xPJAN1NYJJZxyRkIMZ+K9pnF7Nw03lmNn64YCwPYaTCHGRm02ZJdaHodiVyx9HMc:x41NYjzaMZ+ApnVNVQNn64YFYaT7DodH

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks