General
-
Target
098765432345678987654.exe
-
Size
1.7MB
-
Sample
220822-m188hshge5
-
MD5
ca6a0d1a61d47ca4b6e9ea29bb5a357a
-
SHA1
890525244230e81fddf090a13b0502132626bcdf
-
SHA256
d8c010b7d4e2b63ed74a680750f3671ba6674e9c51eb061e610f1ed72ba63f1e
-
SHA512
380dc32bef3f12bbcb14d14340ebbfb362ce37d1e0e54e198236419a9ab4ddefa5f67ce9efc2061b5711aab91f95327d110f190fdf2f1741905807435746df35
-
SSDEEP
24576:v/4W3tsHFhndhZYXQQtLWIPWIjBpikg6:ttYFhndhiXQQNHe
Static task
static1
Behavioral task
behavioral1
Sample
098765432345678987654.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
098765432345678987654.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
098765432345678987654.exe
-
Size
1.7MB
-
MD5
ca6a0d1a61d47ca4b6e9ea29bb5a357a
-
SHA1
890525244230e81fddf090a13b0502132626bcdf
-
SHA256
d8c010b7d4e2b63ed74a680750f3671ba6674e9c51eb061e610f1ed72ba63f1e
-
SHA512
380dc32bef3f12bbcb14d14340ebbfb362ce37d1e0e54e198236419a9ab4ddefa5f67ce9efc2061b5711aab91f95327d110f190fdf2f1741905807435746df35
-
SSDEEP
24576:v/4W3tsHFhndhZYXQQtLWIPWIjBpikg6:ttYFhndhiXQQNHe
Score10/10-
StormKitty payload
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-