General

  • Target

    2025-03-30_8f00fbdfe8a4d26671373207b66f20eb_frostygoop_ghostlocker_sliver

  • Size

    5.9MB

  • Sample

    250330-feenfszzbw

  • MD5

    8f00fbdfe8a4d26671373207b66f20eb

  • SHA1

    7c62e660a71fb0db633b134c1d168c0d3e0c753c

  • SHA256

    041931890ff07618edbf4804b9b2f5b4e52cb688f6e2200d0f45dcced9c05a25

  • SHA512

    d591524e735ea53caa876af509c7a92e4192c5cb78669f459312a549ad3c988038c153f8706c09f71d33493207a517d4c843fac96bb2bb6a2a28feeae18c466f

  • SSDEEP

    98304:Wr1sXcfq5GHAQs97x/1qFI8zThj941RsKRABzueL:1Xcfq5GHZs9thwdx41RI

Malware Config

Targets

    • Target

      2025-03-30_8f00fbdfe8a4d26671373207b66f20eb_frostygoop_ghostlocker_sliver

    • Size

      5.9MB

    • MD5

      8f00fbdfe8a4d26671373207b66f20eb

    • SHA1

      7c62e660a71fb0db633b134c1d168c0d3e0c753c

    • SHA256

      041931890ff07618edbf4804b9b2f5b4e52cb688f6e2200d0f45dcced9c05a25

    • SHA512

      d591524e735ea53caa876af509c7a92e4192c5cb78669f459312a549ad3c988038c153f8706c09f71d33493207a517d4c843fac96bb2bb6a2a28feeae18c466f

    • SSDEEP

      98304:Wr1sXcfq5GHAQs97x/1qFI8zThj941RsKRABzueL:1Xcfq5GHZs9thwdx41RI

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks