General

  • Target

    ca408f5d31588de6bb9bb76d8394025d_JaffaCakes118

  • Size

    479KB

  • Sample

    241206-bb2llaxncl

  • MD5

    ca408f5d31588de6bb9bb76d8394025d

  • SHA1

    6d7d4f847f159ad471e641eef00880cc222a3ac5

  • SHA256

    beb4e718a61260ddfb99047fcfece07ff5a8d5712dea9740b34b57f87e4f63cc

  • SHA512

    5267d4f64b89ccd8bb069a2d91649bf4793399342477fbf57515f5a2cbba6094e823d2f080f16ca13b91865a12159e3f74f76f16ecfd828c42f8198ccbc16a84

  • SSDEEP

    12288:l0Y9hZ0xfz1l/ux+XtnEQtHfvL9N9+I112b73:P2tzP/uxanJHL112bL

Malware Config

Targets

    • Target

      ca408f5d31588de6bb9bb76d8394025d_JaffaCakes118

    • Size

      479KB

    • MD5

      ca408f5d31588de6bb9bb76d8394025d

    • SHA1

      6d7d4f847f159ad471e641eef00880cc222a3ac5

    • SHA256

      beb4e718a61260ddfb99047fcfece07ff5a8d5712dea9740b34b57f87e4f63cc

    • SHA512

      5267d4f64b89ccd8bb069a2d91649bf4793399342477fbf57515f5a2cbba6094e823d2f080f16ca13b91865a12159e3f74f76f16ecfd828c42f8198ccbc16a84

    • SSDEEP

      12288:l0Y9hZ0xfz1l/ux+XtnEQtHfvL9N9+I112b73:P2tzP/uxanJHL112bL

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      #/hsscp.exe

    • Size

      380KB

    • MD5

      b88a964682e3c51a958b0b4e1c344404

    • SHA1

      be5b6d51a7ce314fbcf56376968b8c0c3ba0965f

    • SHA256

      8fad80310d1dce2cda4b9fea04cd75aeec42b0164a9ba5632adb1f0bd729b41d

    • SHA512

      b3df0b55dc48f8f87f4662313174657c1084887e46d387a8891310039d03cffcbc75283eebca8460d8259b4398bd58d8dba36bec820c31c1a4a7e8726381c0b1

    • SSDEEP

      3072:O0liXGGOCEvElZbiP3rL2F+jPNTY1dMFgX:zqEvtPbLW+bNTCdwO

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks