General
-
Target
93099d7605c84c5fcbd45ec0e6b4210c20a4ac7194680de845116b9af0286d2d
-
Size
152KB
-
Sample
220804-l5y3nsegaq
-
MD5
3218a6b674d56aff678ef803ac3b7b57
-
SHA1
180c1091753861286f391d1b4cf5d4c80333e762
-
SHA256
93099d7605c84c5fcbd45ec0e6b4210c20a4ac7194680de845116b9af0286d2d
-
SHA512
198e0c0a03761301248511bac393a2722b05bf32f6351b2baea9f363f67226c5981ed39cfb091daa77aed862b973bd11e35a0a4cde1e74dca8c865cde0141618
Static task
static1
Behavioral task
behavioral1
Sample
93099d7605c84c5fcbd45ec0e6b4210c20a4ac7194680de845116b9af0286d2d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
93099d7605c84c5fcbd45ec0e6b4210c20a4ac7194680de845116b9af0286d2d.exe
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
93099d7605c84c5fcbd45ec0e6b4210c20a4ac7194680de845116b9af0286d2d
-
Size
152KB
-
MD5
3218a6b674d56aff678ef803ac3b7b57
-
SHA1
180c1091753861286f391d1b4cf5d4c80333e762
-
SHA256
93099d7605c84c5fcbd45ec0e6b4210c20a4ac7194680de845116b9af0286d2d
-
SHA512
198e0c0a03761301248511bac393a2722b05bf32f6351b2baea9f363f67226c5981ed39cfb091daa77aed862b973bd11e35a0a4cde1e74dca8c865cde0141618
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-