General
-
Target
jVmDUI3M4mLH141.exe
-
Size
924KB
-
Sample
220830-sswv4saghp
-
MD5
6b2874b71838bb35b1bbf5394322cf2a
-
SHA1
e9f112a2cd8af4359d3833c59421b89dde2f52dd
-
SHA256
346277a4a4b0582ad1e74421617c8d1c33708c0a3803ff2b56ab7bc3af0d7c53
-
SHA512
4c315bbc83e1bc418d3bbbc6212a0c42d4aa4b73b4bf8c9f9bc7244b7fc833c5baa105b5c983383720cd04b415fa07d881857daf4efce028c21f947b8ecd261b
-
SSDEEP
12288:sjVF75eQyMCHA4bPgkgPwqoXYkCkgrQlU2h3Wqzqqj3rZ8D8R/7pkqIwpq:kZ50MEZXYkCTQlU2VWqz9NWA/7R0
Static task
static1
Behavioral task
behavioral1
Sample
jVmDUI3M4mLH141.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
jVmDUI3M4mLH141.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
jVmDUI3M4mLH141.exe
-
Size
924KB
-
MD5
6b2874b71838bb35b1bbf5394322cf2a
-
SHA1
e9f112a2cd8af4359d3833c59421b89dde2f52dd
-
SHA256
346277a4a4b0582ad1e74421617c8d1c33708c0a3803ff2b56ab7bc3af0d7c53
-
SHA512
4c315bbc83e1bc418d3bbbc6212a0c42d4aa4b73b4bf8c9f9bc7244b7fc833c5baa105b5c983383720cd04b415fa07d881857daf4efce028c21f947b8ecd261b
-
SSDEEP
12288:sjVF75eQyMCHA4bPgkgPwqoXYkCkgrQlU2h3Wqzqqj3rZ8D8R/7pkqIwpq:kZ50MEZXYkCTQlU2VWqz9NWA/7R0
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-