General
-
Target
812e860ce5f169fed3c366dc9781e342e6c4da50e997c051e3788621ef71b6af.exe
-
Size
763KB
-
Sample
220804-f8x2wsbdc5
-
MD5
99a852e331165dac3b18906d680ddde1
-
SHA1
65f711d7a0c894caa4fcca0001ebe903bc479d35
-
SHA256
812e860ce5f169fed3c366dc9781e342e6c4da50e997c051e3788621ef71b6af
-
SHA512
d72b76890b6e00e900ddd33cf553512f92a212c59fcba3ac92887a162d0355e3f89f5649c514d492146801a8370237be3669fd2de892fe10a3219050a23c3652
Static task
static1
Behavioral task
behavioral1
Sample
812e860ce5f169fed3c366dc9781e342e6c4da50e997c051e3788621ef71b6af.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
812e860ce5f169fed3c366dc9781e342e6c4da50e997c051e3788621ef71b6af.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
812e860ce5f169fed3c366dc9781e342e6c4da50e997c051e3788621ef71b6af.exe
-
Size
763KB
-
MD5
99a852e331165dac3b18906d680ddde1
-
SHA1
65f711d7a0c894caa4fcca0001ebe903bc479d35
-
SHA256
812e860ce5f169fed3c366dc9781e342e6c4da50e997c051e3788621ef71b6af
-
SHA512
d72b76890b6e00e900ddd33cf553512f92a212c59fcba3ac92887a162d0355e3f89f5649c514d492146801a8370237be3669fd2de892fe10a3219050a23c3652
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-