General
-
Target
Doc899780979080888.pdf.exe
-
Size
710KB
-
Sample
220727-gs3g4sahcn
-
MD5
1156288fa7b4504d394e7006ce7eb902
-
SHA1
75225ebadb39e96e97c5a0c859ae6044f873a524
-
SHA256
1d9598ad9d7e41bd0513c7d263c805fb0598f18c7c69e3997bd109c1e058f212
-
SHA512
92a7cdb3242dad94e9f0c2bcb72cfeec17817e98c7485798e572a2cac8cf3ad48e069f425a03684fa9705c53332dee3433cc358b89da43103fb9bf0cf4457076
Static task
static1
Behavioral task
behavioral1
Sample
Doc899780979080888.pdf.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
Doc899780979080888.pdf.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
Doc899780979080888.pdf.exe
-
Size
710KB
-
MD5
1156288fa7b4504d394e7006ce7eb902
-
SHA1
75225ebadb39e96e97c5a0c859ae6044f873a524
-
SHA256
1d9598ad9d7e41bd0513c7d263c805fb0598f18c7c69e3997bd109c1e058f212
-
SHA512
92a7cdb3242dad94e9f0c2bcb72cfeec17817e98c7485798e572a2cac8cf3ad48e069f425a03684fa9705c53332dee3433cc358b89da43103fb9bf0cf4457076
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-