General
-
Target
Halkbank,.pdf.exe
-
Size
628KB
-
Sample
220804-ktap9schf6
-
MD5
a63e6e9c58e82cce53442ebacb9fb399
-
SHA1
b82363c41eea39a1db51c2ac9bff713dfac171e7
-
SHA256
ec8fddcd3c310a14168754ee1965cfb5c7d7c86360a146c1da4c042afb551dda
-
SHA512
a69cb143ca04b34657421ccc366eb70a752d13e8cc363398486ec6f1abefa8032c156b7abfb38f7a9cc885f8410c835f9f945b515d75384325a7d1e800e7adc7
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank,.pdf.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
Halkbank,.pdf.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
Halkbank,.pdf.exe
-
Size
628KB
-
MD5
a63e6e9c58e82cce53442ebacb9fb399
-
SHA1
b82363c41eea39a1db51c2ac9bff713dfac171e7
-
SHA256
ec8fddcd3c310a14168754ee1965cfb5c7d7c86360a146c1da4c042afb551dda
-
SHA512
a69cb143ca04b34657421ccc366eb70a752d13e8cc363398486ec6f1abefa8032c156b7abfb38f7a9cc885f8410c835f9f945b515d75384325a7d1e800e7adc7
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-