General
-
Target
RFQ___PR.EXE
-
Size
882KB
-
Sample
220727-crjldshcbj
-
MD5
366d5916e23f30ccffc121c1cc4d64b6
-
SHA1
14eeba07231bb2865bb6a8cc4449aaded5f39ce0
-
SHA256
d757a473268b029ee5f0d485c13345d4714da5d7b2e9d73e7f2e0ca9162a2730
-
SHA512
186a27cdda19515b93475291a9ad8ea2033b0035214594e41531894f07ed56f4cf662f4aadd7b1e1d3264a80f53d3e7a8a0ea1bf5adb3a56e02411732b79df29
Static task
static1
Behavioral task
behavioral1
Sample
RFQ___PR.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
RFQ___PR.exe
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
RFQ___PR.EXE
-
Size
882KB
-
MD5
366d5916e23f30ccffc121c1cc4d64b6
-
SHA1
14eeba07231bb2865bb6a8cc4449aaded5f39ce0
-
SHA256
d757a473268b029ee5f0d485c13345d4714da5d7b2e9d73e7f2e0ca9162a2730
-
SHA512
186a27cdda19515b93475291a9ad8ea2033b0035214594e41531894f07ed56f4cf662f4aadd7b1e1d3264a80f53d3e7a8a0ea1bf5adb3a56e02411732b79df29
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-