General
-
Target
Swift-PaymentInvoice20220331_pdf.exe
-
Size
520KB
-
Sample
220404-ytqy5sbhd2
-
MD5
72a9bcce9a210198f0d6a679b5bca7e4
-
SHA1
d19326cef0a76c63343fb2a762331639ed6617c2
-
SHA256
407f8e8ab8d4141df81d49cbb94e54ec89c80cd76ca0fa23b1bb2aa0ba74b0dc
-
SHA512
ec190a3a1a887f8c4cd4863c671c5da20cc24ce6cb3ed14320a07e8e0318da7833bf882843175ea6cfe29a333839adca6f2bf4c606cba2ba0a7a012bb27824c6
Static task
static1
Behavioral task
behavioral1
Sample
Swift-PaymentInvoice20220331_pdf.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
Swift-PaymentInvoice20220331_pdf.exe
Resource
win10v2004-20220331-en
Malware Config
Targets
-
-
Target
Swift-PaymentInvoice20220331_pdf.exe
-
Size
520KB
-
MD5
72a9bcce9a210198f0d6a679b5bca7e4
-
SHA1
d19326cef0a76c63343fb2a762331639ed6617c2
-
SHA256
407f8e8ab8d4141df81d49cbb94e54ec89c80cd76ca0fa23b1bb2aa0ba74b0dc
-
SHA512
ec190a3a1a887f8c4cd4863c671c5da20cc24ce6cb3ed14320a07e8e0318da7833bf882843175ea6cfe29a333839adca6f2bf4c606cba2ba0a7a012bb27824c6
Score10/10-
StormKitty Payload
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-