General
-
Target
1f2c72f6dc8280281f42c3acdd98c603f35a4ae6030de80ce1641b27ab9ee96d
-
Size
201KB
-
Sample
220804-lvgqmsefbj
-
MD5
366ef4563060fcaca0bd77637f4521f1
-
SHA1
5f3d5371fe0f421275258bfc1682f6966e54bfc4
-
SHA256
1f2c72f6dc8280281f42c3acdd98c603f35a4ae6030de80ce1641b27ab9ee96d
-
SHA512
41b34689ecf26cc19ebbc787964b038804d95e106f55531fa7239032942a2b55083ed7b0c50ef9be9ec9d8cca40affeb2484ff79a2dd6f22f7383c81079f2bad
Static task
static1
Behavioral task
behavioral1
Sample
1f2c72f6dc8280281f42c3acdd98c603f35a4ae6030de80ce1641b27ab9ee96d.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
1f2c72f6dc8280281f42c3acdd98c603f35a4ae6030de80ce1641b27ab9ee96d.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
1f2c72f6dc8280281f42c3acdd98c603f35a4ae6030de80ce1641b27ab9ee96d
-
Size
201KB
-
MD5
366ef4563060fcaca0bd77637f4521f1
-
SHA1
5f3d5371fe0f421275258bfc1682f6966e54bfc4
-
SHA256
1f2c72f6dc8280281f42c3acdd98c603f35a4ae6030de80ce1641b27ab9ee96d
-
SHA512
41b34689ecf26cc19ebbc787964b038804d95e106f55531fa7239032942a2b55083ed7b0c50ef9be9ec9d8cca40affeb2484ff79a2dd6f22f7383c81079f2bad
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-