General
-
Target
6862264bbd7688ac4bd96f16786cd153.exe
-
Size
136KB
-
Sample
220802-wm15esahek
-
MD5
6862264bbd7688ac4bd96f16786cd153
-
SHA1
8fd23a996f8b78914f9969cb3c31be7ffd02e346
-
SHA256
701ef63a3a8c4f2eb90d64cd897e0098460e1272a54404b90ab794a685b98ffc
-
SHA512
23df9d7fe2e8028d2b7f985344ac5ff0d01f9a45f0925f6b37b0df64aab3702612e5bfb56cb29bc2325bd26ffe152fc69f4af5e36d0e94a97a6f04d27460c2e2
Behavioral task
behavioral1
Sample
6862264bbd7688ac4bd96f16786cd153.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
6862264bbd7688ac4bd96f16786cd153.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
6862264bbd7688ac4bd96f16786cd153.exe
-
Size
136KB
-
MD5
6862264bbd7688ac4bd96f16786cd153
-
SHA1
8fd23a996f8b78914f9969cb3c31be7ffd02e346
-
SHA256
701ef63a3a8c4f2eb90d64cd897e0098460e1272a54404b90ab794a685b98ffc
-
SHA512
23df9d7fe2e8028d2b7f985344ac5ff0d01f9a45f0925f6b37b0df64aab3702612e5bfb56cb29bc2325bd26ffe152fc69f4af5e36d0e94a97a6f04d27460c2e2
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-