General

  • Target

    5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc

  • Size

    297KB

  • Sample

    240817-2nmajs1fmh

  • MD5

    fb7bed457cb3d5be6c8b80f3105cc3d3

  • SHA1

    0a60f5ca1e55b180ee0db151830c477d361aea3c

  • SHA256

    5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc

  • SHA512

    36d29cca7be2e416545273860e9a38d3df930d657bc39fba299dcee03138a52e5ca4292d4a5d3a4a3277582b24008c3edd225df341f81063b963ada438c7fd88

  • SSDEEP

    6144:thiCNeUwAe6krgybO4Ef2z0Ysapo1y+S5ORiv:tTNeUwAr2hd0yZv

Malware Config

Targets

    • Target

      5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc

    • Size

      297KB

    • MD5

      fb7bed457cb3d5be6c8b80f3105cc3d3

    • SHA1

      0a60f5ca1e55b180ee0db151830c477d361aea3c

    • SHA256

      5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc

    • SHA512

      36d29cca7be2e416545273860e9a38d3df930d657bc39fba299dcee03138a52e5ca4292d4a5d3a4a3277582b24008c3edd225df341f81063b963ada438c7fd88

    • SSDEEP

      6144:thiCNeUwAe6krgybO4Ef2z0Ysapo1y+S5ORiv:tTNeUwAr2hd0yZv

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks