General
-
Target
98d37790e570afd49b7a00192019f6c9e7c84e96069da4daa1b64a6cc88695a8
-
Size
406KB
-
Sample
220817-gs8zwsbdhj
-
MD5
2bb1aa0fd3ba10b9da58570bdf755402
-
SHA1
a31cb26e9cd88c0a26b576aa4f185ed5f5135fb4
-
SHA256
98d37790e570afd49b7a00192019f6c9e7c84e96069da4daa1b64a6cc88695a8
-
SHA512
2cba6e41ad6978ea4914e52823d1af6c0372933eba71bc7e2ad4fd732a8c4ed905418ec0f7507835bacc81121e9784703239a2ce429406e61fd3abfea4901356
-
SSDEEP
6144:UvEN2U+T6i5LirrllHy4HUcMQY6pdrsX/:GENN+T5xYrllrU7QY6pGv
Behavioral task
behavioral1
Sample
98d37790e570afd49b7a00192019f6c9e7c84e96069da4daa1b64a6cc88695a8.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
98d37790e570afd49b7a00192019f6c9e7c84e96069da4daa1b64a6cc88695a8
-
Size
406KB
-
MD5
2bb1aa0fd3ba10b9da58570bdf755402
-
SHA1
a31cb26e9cd88c0a26b576aa4f185ed5f5135fb4
-
SHA256
98d37790e570afd49b7a00192019f6c9e7c84e96069da4daa1b64a6cc88695a8
-
SHA512
2cba6e41ad6978ea4914e52823d1af6c0372933eba71bc7e2ad4fd732a8c4ed905418ec0f7507835bacc81121e9784703239a2ce429406e61fd3abfea4901356
-
SSDEEP
6144:UvEN2U+T6i5LirrllHy4HUcMQY6pdrsX/:GENN+T5xYrllrU7QY6pGv
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
StormKitty payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-