General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.7170.exe

  • Size

    1.0MB

  • Sample

    220908-gak54sbadr

  • MD5

    3336f2ce3d9c24e7f98d1646c117e00d

  • SHA1

    d6b0ea87576b8e98917f72077226b1d14f7d46ba

  • SHA256

    0aa8c16926f65f1882953c640bcd56c9ca2ed25b1d35461d07d79d47cbdc60af

  • SHA512

    027ab41873177a893001ab8921ed15ad1a929053a9976134db1c202b983246b075848e1db783b6d5c84ebe01257a20d554a6aea1b25ff1b21d6117d1b520cfa7

  • SSDEEP

    12288:6kNjmkx1761qxU3l15q2T8/J+1Fg3lvRfUlmFsv1Oic7afIe91vYw:6kxmkTyn02kAFg3lpQFbAeH

Malware Config

Targets

    • Target

      SecuriteInfo.com.Win32.PWSX-gen.7170.exe

    • Size

      1.0MB

    • MD5

      3336f2ce3d9c24e7f98d1646c117e00d

    • SHA1

      d6b0ea87576b8e98917f72077226b1d14f7d46ba

    • SHA256

      0aa8c16926f65f1882953c640bcd56c9ca2ed25b1d35461d07d79d47cbdc60af

    • SHA512

      027ab41873177a893001ab8921ed15ad1a929053a9976134db1c202b983246b075848e1db783b6d5c84ebe01257a20d554a6aea1b25ff1b21d6117d1b520cfa7

    • SSDEEP

      12288:6kNjmkx1761qxU3l15q2T8/J+1Fg3lvRfUlmFsv1Oic7afIe91vYw:6kxmkTyn02kAFg3lpQFbAeH

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks