General

  • Target

    3c59b192de59c7df9823f52132842f10_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240712-hhg9vsvdla

  • MD5

    3c59b192de59c7df9823f52132842f10

  • SHA1

    5ccc0f47c524f3d612cccd0746af18deb6b1910f

  • SHA256

    53646183c38ea733589a21db7cb248ce93b35b81ebe95c615206e79d7a7c80b4

  • SHA512

    761b60cce8d5bad6654a424fcd31c4d525aa788a07ebf373f8816fff2c752306aa72b6556e85d43905859aa80aea85b985c2681da4e96bcd389c688abf0cc2c4

  • SSDEEP

    24576:mGn3mguICPTiY98ktu98JuEeXYPbGk2rlalIhdM3vE5XClPZWXqx0fLAD+SlzwJ6:mG3m78ktrJ9zGJlNhdMUClPZuqqfL6nk

Malware Config

Targets

    • Target

      3c59b192de59c7df9823f52132842f10_JaffaCakes118

    • Size

      1.3MB

    • MD5

      3c59b192de59c7df9823f52132842f10

    • SHA1

      5ccc0f47c524f3d612cccd0746af18deb6b1910f

    • SHA256

      53646183c38ea733589a21db7cb248ce93b35b81ebe95c615206e79d7a7c80b4

    • SHA512

      761b60cce8d5bad6654a424fcd31c4d525aa788a07ebf373f8816fff2c752306aa72b6556e85d43905859aa80aea85b985c2681da4e96bcd389c688abf0cc2c4

    • SSDEEP

      24576:mGn3mguICPTiY98ktu98JuEeXYPbGk2rlalIhdM3vE5XClPZWXqx0fLAD+SlzwJ6:mG3m78ktrJ9zGJlNhdMUClPZuqqfL6nk

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks