General

  • Target

    2025-03-30_759850b1ce1d64533dfea82dcf5c00b3_frostygoop_ghostlocker_sliver

  • Size

    21.4MB

  • Sample

    250330-xftx7st1cv

  • MD5

    759850b1ce1d64533dfea82dcf5c00b3

  • SHA1

    06ef173730c2b389ce26e19c65f27c6fbf6d61b3

  • SHA256

    373d1f853c91d91ca2bc663d3776eefb66189d3c424c683224039d5d6f477099

  • SHA512

    bec70ed7abf337d0318e10f415ab26b0f1ab91e7f26881793617e16c539593d1ea60623dc7fe95ac1155bb778502b74f73428d364e4b5bca672f370128fba110

  • SSDEEP

    393216:XNVguCXVYHSTEUq9D1CvTQ2S9nekuCdQkUkEwmkO77j+vPhwrgxuA:XNVgLXVpT94WQ2S9nvViVkKvj6PHxF

Malware Config

Targets

    • Target

      2025-03-30_759850b1ce1d64533dfea82dcf5c00b3_frostygoop_ghostlocker_sliver

    • Size

      21.4MB

    • MD5

      759850b1ce1d64533dfea82dcf5c00b3

    • SHA1

      06ef173730c2b389ce26e19c65f27c6fbf6d61b3

    • SHA256

      373d1f853c91d91ca2bc663d3776eefb66189d3c424c683224039d5d6f477099

    • SHA512

      bec70ed7abf337d0318e10f415ab26b0f1ab91e7f26881793617e16c539593d1ea60623dc7fe95ac1155bb778502b74f73428d364e4b5bca672f370128fba110

    • SSDEEP

      393216:XNVguCXVYHSTEUq9D1CvTQ2S9nekuCdQkUkEwmkO77j+vPhwrgxuA:XNVgLXVpT94WQ2S9nvViVkKvj6PHxF

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks