General

  • Target

    EulenCheat-main.zip

  • Size

    2.1MB

  • Sample

    230109-vl3q7aeh89

  • MD5

    e364ca3fa139d35232a065c82dd097e5

  • SHA1

    23bad46792d9b25ebe0606b08ac4690704d32ff4

  • SHA256

    32b1c4d2bd93dc1955cf707df03d56ca97685391da88b8b5fe3f778a86c08275

  • SHA512

    05de575155dc25631e8f6e57d89ab73972b0da75a5c492fe88e99856cffab5a2de37cba2a514e43df50adc29572fe2402905bfd6a7bf5c71170130a4563abf7d

  • SSDEEP

    49152:03Ixz/bi5l5tJweyCpjIpV2zbbCzFSEAgjJbihhWzwvvACWzKw:9zuNfweygjMAbMS2bEvvG1

Malware Config

Targets

    • Target

      EulenCheat-main/EulenCheat.exe

    • Size

      2.2MB

    • MD5

      e1c2e771756f041829406106d6c64f35

    • SHA1

      fbd385c064784ca0a4252e56aa73ccdfe15004a3

    • SHA256

      98069f38982bcc10318a09792dde1a12d4786b12ee3355cc505ca9f73d8726ea

    • SHA512

      c594256833088c89657bf26564374239a6d5ba9125db4c9285c631e2ea73d393319e21e2d210d968fac6abdad0ad9b2d0399988169739671433a4df29fce2ef0

    • SSDEEP

      49152:04/o7K1lja8Gdq7ZMHbLjSR9SBl5c9Tc+MGlDKVXhWd9/2AATSANne:d/zXjaL4ZMHbLjQElAcfMDz+fNne

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks