General

  • Target

    2024-10-30_b710318c9e53a913b0980d712f545dce_avoslocker_hijackloader

  • Size

    3.5MB

  • Sample

    241030-z27gjazndt

  • MD5

    b710318c9e53a913b0980d712f545dce

  • SHA1

    35a7fa3ce975e9523db30e0fa336f26df44dd595

  • SHA256

    bbbe89f639a538b804eefebffac0659d5879938423280baa10bf989a533f34e3

  • SHA512

    a43ac36654ef09ea1078a1caaf9fe354cf48b38aac52ff28b170fa197018bcae83471125a143b7689c0fbdca7c08a701f07478c13de58adcf5df3ffc502b6da3

  • SSDEEP

    98304:5AyJqL5ceKpuULlMr/vOU/jIEeQfoR/IuOFVjUu5:5AyJHy1FIF0wu

Malware Config

Targets

    • Target

      2024-10-30_b710318c9e53a913b0980d712f545dce_avoslocker_hijackloader

    • Size

      3.5MB

    • MD5

      b710318c9e53a913b0980d712f545dce

    • SHA1

      35a7fa3ce975e9523db30e0fa336f26df44dd595

    • SHA256

      bbbe89f639a538b804eefebffac0659d5879938423280baa10bf989a533f34e3

    • SHA512

      a43ac36654ef09ea1078a1caaf9fe354cf48b38aac52ff28b170fa197018bcae83471125a143b7689c0fbdca7c08a701f07478c13de58adcf5df3ffc502b6da3

    • SSDEEP

      98304:5AyJqL5ceKpuULlMr/vOU/jIEeQfoR/IuOFVjUu5:5AyJHy1FIF0wu

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks