General
-
Target
hesaphareketi-01.exe
-
Size
837KB
-
Sample
220810-jm4jbshag3
-
MD5
ac4698531e36e36d068bbaa08e278dee
-
SHA1
7e09c7d495898bd992a1f7b0f516213df7775bd1
-
SHA256
b287de3756df371e1046322a567e8d8394a85915a80838c1832388a88c9dd9cd
-
SHA512
32804f2299a6a1bec3bb56846100a8619272c23409dd8fcd410f55b8395fb775e7da17ab9f04adf3f5065c8fef680013d6977832cc7e077b158b31c27a016f44
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
hesaphareketi-01.exe
-
Size
837KB
-
MD5
ac4698531e36e36d068bbaa08e278dee
-
SHA1
7e09c7d495898bd992a1f7b0f516213df7775bd1
-
SHA256
b287de3756df371e1046322a567e8d8394a85915a80838c1832388a88c9dd9cd
-
SHA512
32804f2299a6a1bec3bb56846100a8619272c23409dd8fcd410f55b8395fb775e7da17ab9f04adf3f5065c8fef680013d6977832cc7e077b158b31c27a016f44
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-