General

  • Target

    PO No. 27485758.exe

  • Size

    228KB

  • Sample

    220908-pr1k5abgbp

  • MD5

    47607a1861b00bcf044d136eadee4ab9

  • SHA1

    a8879f81f8547d46930f0cd4ce338cf8af54232e

  • SHA256

    3be69750b64f87e18bcd6d779fbc9511f17e57b8c7738d9374e262fb377ff56a

  • SHA512

    486c4e12ec2f4cf27782e73c433a62f15e6021db2e890e94161a61a2bf591897cec8ce56bd162488bf5de1b676dc69e7ee104f8b27fde2a9126ca024a9266e1a

  • SSDEEP

    3072:x+T6gqPPIvuvHQFpaIYkKEPIFJzE17vtx:n59HsaIYkb

Malware Config

Targets

    • Target

      PO No. 27485758.exe

    • Size

      228KB

    • MD5

      47607a1861b00bcf044d136eadee4ab9

    • SHA1

      a8879f81f8547d46930f0cd4ce338cf8af54232e

    • SHA256

      3be69750b64f87e18bcd6d779fbc9511f17e57b8c7738d9374e262fb377ff56a

    • SHA512

      486c4e12ec2f4cf27782e73c433a62f15e6021db2e890e94161a61a2bf591897cec8ce56bd162488bf5de1b676dc69e7ee104f8b27fde2a9126ca024a9266e1a

    • SSDEEP

      3072:x+T6gqPPIvuvHQFpaIYkKEPIFJzE17vtx:n59HsaIYkb

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks