General
-
Target
Ziraat Bankas Swift Mesaj.exe
-
Size
434KB
-
Sample
220728-tdpnxshah6
-
MD5
49a315adc23495aea8ed27cfb1e74b2d
-
SHA1
df976bb5c6b4a444275bc45b863ef4e8e99c360e
-
SHA256
4355bf421266b0e7eafb3de8975d4aa925363c3adfe167fa550dcf02e56b6a64
-
SHA512
23d409c3638b592d94bb8dce46039a45870b79ec015892e7bf8a5892cc47d439f04cbfa4cdf7eab69619645e913c5793d15c22a349d3549e624145739943e706
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat Bankas Swift Mesaj.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
Ziraat Bankas Swift Mesaj.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
Ziraat Bankas Swift Mesaj.exe
-
Size
434KB
-
MD5
49a315adc23495aea8ed27cfb1e74b2d
-
SHA1
df976bb5c6b4a444275bc45b863ef4e8e99c360e
-
SHA256
4355bf421266b0e7eafb3de8975d4aa925363c3adfe167fa550dcf02e56b6a64
-
SHA512
23d409c3638b592d94bb8dce46039a45870b79ec015892e7bf8a5892cc47d439f04cbfa4cdf7eab69619645e913c5793d15c22a349d3549e624145739943e706
Score10/10-
StormKitty payload
-
Downloads MZ/PE file
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-