General
-
Target
doc 27008875424678 001.pdf.exe
-
Size
612KB
-
Sample
220727-p71k3aeaem
-
MD5
e439e9fd2d06802bc8aba7114efeb276
-
SHA1
a158391f5f8bdd683852dc95c1bc144852f38a02
-
SHA256
67b1c9f9637d8c16e2966babd6b7a06c2396cbc918b31c0649adf61b7a2a7778
-
SHA512
4aef174be589396ac8b2fbc6eb02b13378b62a5d75659a67c14af83f6a00248450a9e641cd52cadc9e83394db10bc44673de387380a46618c9e61e813bfbfef8
Static task
static1
Behavioral task
behavioral1
Sample
doc 27008875424678 001.pdf.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
doc 27008875424678 001.pdf.exe
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
doc 27008875424678 001.pdf.exe
-
Size
612KB
-
MD5
e439e9fd2d06802bc8aba7114efeb276
-
SHA1
a158391f5f8bdd683852dc95c1bc144852f38a02
-
SHA256
67b1c9f9637d8c16e2966babd6b7a06c2396cbc918b31c0649adf61b7a2a7778
-
SHA512
4aef174be589396ac8b2fbc6eb02b13378b62a5d75659a67c14af83f6a00248450a9e641cd52cadc9e83394db10bc44673de387380a46618c9e61e813bfbfef8
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-