General

  • Target

    2025-04-18_7045cd8785aa7d9caa2ba378363dd051_elex_frostygoop_ghostlocker_sliver

  • Size

    21.4MB

  • Sample

    250418-za4lkat1fx

  • MD5

    7045cd8785aa7d9caa2ba378363dd051

  • SHA1

    a7bc1b3074ef3cb4c645d1db3197138191ce9cb4

  • SHA256

    b2bc50d6e956c1354704fca3ce5deb206b09ac31cef9136d1034c11eb9f81090

  • SHA512

    bc86d276d1bad3ab2baa91ea4659383277a76b21c99af53a8e8501e92a19064516af6eeba8a7d4e70135a4f1418ccf96bdade89d996bb345f6216cec9f0bc522

  • SSDEEP

    393216:wNVfvW/1YXeguzGEGX9Nrl2PwnQKBWlR0JkLT4V/5J1Ehg:wNVfs1t2VleP+6T4XDJ

Malware Config

Targets

    • Target

      2025-04-18_7045cd8785aa7d9caa2ba378363dd051_elex_frostygoop_ghostlocker_sliver

    • Size

      21.4MB

    • MD5

      7045cd8785aa7d9caa2ba378363dd051

    • SHA1

      a7bc1b3074ef3cb4c645d1db3197138191ce9cb4

    • SHA256

      b2bc50d6e956c1354704fca3ce5deb206b09ac31cef9136d1034c11eb9f81090

    • SHA512

      bc86d276d1bad3ab2baa91ea4659383277a76b21c99af53a8e8501e92a19064516af6eeba8a7d4e70135a4f1418ccf96bdade89d996bb345f6216cec9f0bc522

    • SSDEEP

      393216:wNVfvW/1YXeguzGEGX9Nrl2PwnQKBWlR0JkLT4V/5J1Ehg:wNVfs1t2VleP+6T4XDJ

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks