General
-
Target
9d7cb550c366b91e89384152462bc655.exe
-
Size
132KB
-
Sample
220816-h54rdagfg6
-
MD5
9d7cb550c366b91e89384152462bc655
-
SHA1
503f7fbcfc11e364378d085a3f10d212b00d2b66
-
SHA256
3704c9065de2c596066dbca893c63b1d12b9264d62cffd92ffc49aaf919b49a5
-
SHA512
058832e14bceb6d2fc66f4a59f93507c88e509c2eaaf9680e342a86074c9da3ca6b7cbed5c18da98c16d30527f9c779c62979f752309b33a013275b73963343d
Behavioral task
behavioral1
Sample
9d7cb550c366b91e89384152462bc655.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d7cb550c366b91e89384152462bc655.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
9d7cb550c366b91e89384152462bc655.exe
-
Size
132KB
-
MD5
9d7cb550c366b91e89384152462bc655
-
SHA1
503f7fbcfc11e364378d085a3f10d212b00d2b66
-
SHA256
3704c9065de2c596066dbca893c63b1d12b9264d62cffd92ffc49aaf919b49a5
-
SHA512
058832e14bceb6d2fc66f4a59f93507c88e509c2eaaf9680e342a86074c9da3ca6b7cbed5c18da98c16d30527f9c779c62979f752309b33a013275b73963343d
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-