General
-
Target
017c86f8f1607d55e270cdd1cce5864c.exe
-
Size
309KB
-
Sample
210109-7wrstgb9lj
-
MD5
017c86f8f1607d55e270cdd1cce5864c
-
SHA1
17d42408e24effdb365e59105f5ba080ad98c609
-
SHA256
27b55c8a94eb835f7ef194183f088415ac4e75348609465a1393043ab6161631
-
SHA512
1e0a9b8c21a7d0e91ee62d3111fd6b05d523fb48eb7ec94544202c9f6942ff6db358d25737304dec13368e4dd79fb3a9a37f499a925377ec7cd035e1f71d3b91
Static task
static1
Behavioral task
behavioral1
Sample
017c86f8f1607d55e270cdd1cce5864c.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
017c86f8f1607d55e270cdd1cce5864c.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
017c86f8f1607d55e270cdd1cce5864c.exe
-
Size
309KB
-
MD5
017c86f8f1607d55e270cdd1cce5864c
-
SHA1
17d42408e24effdb365e59105f5ba080ad98c609
-
SHA256
27b55c8a94eb835f7ef194183f088415ac4e75348609465a1393043ab6161631
-
SHA512
1e0a9b8c21a7d0e91ee62d3111fd6b05d523fb48eb7ec94544202c9f6942ff6db358d25737304dec13368e4dd79fb3a9a37f499a925377ec7cd035e1f71d3b91
Score10/10-
StormKitty Payload
-
Downloads MZ/PE file
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-