General
-
Target
hesaphareketi-01.exe
-
Size
238KB
-
Sample
220818-xxmv8adef6
-
MD5
b26acc800dd682972c7d6369df815636
-
SHA1
70bcaf8b0f4b74816365cf87df00360325a33d58
-
SHA256
9e67169785560714650f46f52a0a04d3520d07fc3d431f6f537897bda3334403
-
SHA512
c96a205e421d6f18393c2d9aca67804c5cf21cd5e1378bccd575796b1172ba044b414b38f169bf24564cf5815d4689884e8cf29a23f322ea5279e7742aaa6731
-
SSDEEP
3072:mw4wu+T6gqPPIvuvHQFpaIYkKEPIFJzE17vtR:kb59HsaIYkb
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
hesaphareketi-01.exe
-
Size
238KB
-
MD5
b26acc800dd682972c7d6369df815636
-
SHA1
70bcaf8b0f4b74816365cf87df00360325a33d58
-
SHA256
9e67169785560714650f46f52a0a04d3520d07fc3d431f6f537897bda3334403
-
SHA512
c96a205e421d6f18393c2d9aca67804c5cf21cd5e1378bccd575796b1172ba044b414b38f169bf24564cf5815d4689884e8cf29a23f322ea5279e7742aaa6731
-
SSDEEP
3072:mw4wu+T6gqPPIvuvHQFpaIYkKEPIFJzE17vtR:kb59HsaIYkb
-
StormKitty payload
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-