General
-
Target
fafa8057f024c7a3c30e48b63d05d712e7de1f2f38f592a03cabbe8917942a89
-
Size
132KB
-
Sample
220809-t8bqjsdbbl
-
MD5
f7e5a5c100fcf5a248dfe0424bc5bbdc
-
SHA1
05fab29b3f901ea56ebc0d5e240aa747aa44ee4f
-
SHA256
fafa8057f024c7a3c30e48b63d05d712e7de1f2f38f592a03cabbe8917942a89
-
SHA512
048b661425a63033980b1253bd0e8e24de0eb6ea230e24c46eec965371cd74f7ebd27ae004f6ee006abb48879fa3258ff6d4d049380ea8da57cda5953fb91bf2
Behavioral task
behavioral1
Sample
fafa8057f024c7a3c30e48b63d05d712e7de1f2f38f592a03cabbe8917942a89.exe
Resource
win10-20220722-en
Malware Config
Targets
-
-
Target
fafa8057f024c7a3c30e48b63d05d712e7de1f2f38f592a03cabbe8917942a89
-
Size
132KB
-
MD5
f7e5a5c100fcf5a248dfe0424bc5bbdc
-
SHA1
05fab29b3f901ea56ebc0d5e240aa747aa44ee4f
-
SHA256
fafa8057f024c7a3c30e48b63d05d712e7de1f2f38f592a03cabbe8917942a89
-
SHA512
048b661425a63033980b1253bd0e8e24de0eb6ea230e24c46eec965371cd74f7ebd27ae004f6ee006abb48879fa3258ff6d4d049380ea8da57cda5953fb91bf2
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-