General
-
Target
SP SOLICITAR OFERTA 2022-SEPT xlxs(78KB).img.zip
-
Size
125KB
-
Sample
220907-kzhytsbeb6
-
MD5
388b00d9115eb34ea767aa481c582a95
-
SHA1
7e62a90918ebc80ed8fb9890698b2f988c646816
-
SHA256
92fbc4eb738918fe5ffa5e4e78f0c37242480906b4711cb900eaef7f8c1b3df5
-
SHA512
699806f48f6a1b44c6d601779fd898c9542d0176363ac8c37ede963992b627d928c38076dbfd3d1c749707862a2c7bad028150c33ff41a51e52ee893103b1131
-
SSDEEP
3072:QYIkqwJV1m6hgdGhxkUi7fnpQI7hpeUL29W:QOV1m6hgdGQUiDnC3USw
Static task
static1
Behavioral task
behavioral1
Sample
SP SOLICITAR OFERTA 2022-SEPT.xlxs(78KB).exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SP SOLICITAR OFERTA 2022-SEPT.xlxs(78KB).exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
SP SOLICITAR OFERTA 2022-SEPT.xlxs(78KB).exe
-
Size
161KB
-
MD5
15c9f1c169e3c865751bfd982558764f
-
SHA1
2da54d454e1465d475308604fc1fdd1e05f47a86
-
SHA256
cfcd7de22c049bdefa98959de3072b2bfc12e280193d43e4749a84e48ba665b6
-
SHA512
319096edbf164999491ee4d533d5e3a6d62a43695752d1265bf20bffef64ea6da64d1ff6cce87711ce9b86046132087c2daba72802b8326e8fca2a6a6bad4d24
-
SSDEEP
3072:xPJAN1NYJJZxyRkIMZ+K9pnF7Nw03lmNn64YCwPYaTCHGRm02ZJdaHodiVyx9HMc:x41NYjzaMZ+ApnVNVQNn64YFYaT7DodH
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-