General

  • Target

    FreePhotoShopMemeCoinPacks.exe

  • Size

    250KB

  • Sample

    250417-qwg51svtev

  • MD5

    310c1b76fbf1b164cc59a158949d24f3

  • SHA1

    5bedfc6a6bbfbc79ec5a1510a5bb45e48ec9d914

  • SHA256

    138b3883e8ccf6496ae1d5f9499a8dda3e46be499eed57d054d810079b91ecb2

  • SHA512

    1f4451f9af213f4329b3b4b9c4d3069cbdee2fb8a6e82cb7494b361a3b8d907ded7b71261330fc8b21271c1414359c5955fa311c2a229e3b0179a216eb0212a8

  • SSDEEP

    6144:P6AfoFv2O72QFbFB/lkyO4k/v9bdUkbz:SAQFuS2QFhjkysw

Malware Config

Targets

    • Target

      FreePhotoShopMemeCoinPacks.exe

    • Size

      250KB

    • MD5

      310c1b76fbf1b164cc59a158949d24f3

    • SHA1

      5bedfc6a6bbfbc79ec5a1510a5bb45e48ec9d914

    • SHA256

      138b3883e8ccf6496ae1d5f9499a8dda3e46be499eed57d054d810079b91ecb2

    • SHA512

      1f4451f9af213f4329b3b4b9c4d3069cbdee2fb8a6e82cb7494b361a3b8d907ded7b71261330fc8b21271c1414359c5955fa311c2a229e3b0179a216eb0212a8

    • SSDEEP

      6144:P6AfoFv2O72QFbFB/lkyO4k/v9bdUkbz:SAQFuS2QFhjkysw

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks