General

  • Target

    2025-04-19_fddeee6a843d81889f8bb627fedc83be_elex_frostygoop_ghostlocker_sliver

  • Size

    21.4MB

  • Sample

    250419-hpf1da1ls7

  • MD5

    fddeee6a843d81889f8bb627fedc83be

  • SHA1

    a712cde6fafbbff41d2c80aab63871950013158a

  • SHA256

    f7750ae896f6ad8ebf4e4ce19e7f7b304c74f909a1aa8e558ecfb9682de2059f

  • SHA512

    908187b5137448f4a1fd67575fb5516d25beeaccc0550230a07ce470c6bb1c479f7e38a9f32d08da0d693b4a2a19b3aef5f7678fb84e270eca6595640aabd7c9

  • SSDEEP

    393216:9NVKoYRwcInv/8CnSjJy1hMwFjC5KXsIsL1agh05ZSnI1hg:9NV3YRno0CgKsIsxagh0nE

Malware Config

Targets

    • Target

      2025-04-19_fddeee6a843d81889f8bb627fedc83be_elex_frostygoop_ghostlocker_sliver

    • Size

      21.4MB

    • MD5

      fddeee6a843d81889f8bb627fedc83be

    • SHA1

      a712cde6fafbbff41d2c80aab63871950013158a

    • SHA256

      f7750ae896f6ad8ebf4e4ce19e7f7b304c74f909a1aa8e558ecfb9682de2059f

    • SHA512

      908187b5137448f4a1fd67575fb5516d25beeaccc0550230a07ce470c6bb1c479f7e38a9f32d08da0d693b4a2a19b3aef5f7678fb84e270eca6595640aabd7c9

    • SSDEEP

      393216:9NVKoYRwcInv/8CnSjJy1hMwFjC5KXsIsL1agh05ZSnI1hg:9NV3YRno0CgKsIsxagh0nE

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks