General
-
Target
1440-67-0x0000000000400000-0x0000000000425000-memory.dmp
-
Size
148KB
-
Sample
220815-lm928abgg7
-
MD5
ee33905972158ec063901eedea351816
-
SHA1
0019af911d58e5b00e6e4f80ee5b90c14cc6b8bd
-
SHA256
dc513d0a1d8a81d37e04bbdc32768bb5c6caaccc7ab1db4172b5461f7e1db9f4
-
SHA512
a425f49ad22baeb3d2d982504a94ff86a5ea234606c875bf7679e0b91911ae45bb1b525a66c30709a1cdcec5273b1e803a31bff97e575d5d118c0ad29492709b
Behavioral task
behavioral1
Sample
1440-67-0x0000000000400000-0x0000000000425000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1440-67-0x0000000000400000-0x0000000000425000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
1440-67-0x0000000000400000-0x0000000000425000-memory.dmp
-
Size
148KB
-
MD5
ee33905972158ec063901eedea351816
-
SHA1
0019af911d58e5b00e6e4f80ee5b90c14cc6b8bd
-
SHA256
dc513d0a1d8a81d37e04bbdc32768bb5c6caaccc7ab1db4172b5461f7e1db9f4
-
SHA512
a425f49ad22baeb3d2d982504a94ff86a5ea234606c875bf7679e0b91911ae45bb1b525a66c30709a1cdcec5273b1e803a31bff97e575d5d118c0ad29492709b
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-