General
-
Target
SecuriteInfo.com.Variant.Strictor.275243.4783.12617.exe
-
Size
158KB
-
Sample
220908-lsrstsbdel
-
MD5
8c63ee48a3ee135f8a24ba6dbc960d38
-
SHA1
cc3a3b766ebbd81f56c759bc0363d12c7c7df92f
-
SHA256
1b756d9f63963c6272fa1873b1e5d25e569201c44f09f83b103b8ff2f99eb443
-
SHA512
d8a6c697a51afed0303216b1ca8ff191b67c48e3254ffc317b049704862cff48071b8b192a79ed5065ac5b0ead29304cb797b508182afa9bf7dd381c4a161727
-
SSDEEP
3072:D0f6jMeqPqyow7Wje/6pNZuq8AdKsBPDwbMsykRRjEMSeQ0tyvBHMc:D0UWejzuqIsebMsFXsBMc
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Strictor.275243.4783.12617.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Strictor.275243.4783.12617.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Variant.Strictor.275243.4783.12617.exe
-
Size
158KB
-
MD5
8c63ee48a3ee135f8a24ba6dbc960d38
-
SHA1
cc3a3b766ebbd81f56c759bc0363d12c7c7df92f
-
SHA256
1b756d9f63963c6272fa1873b1e5d25e569201c44f09f83b103b8ff2f99eb443
-
SHA512
d8a6c697a51afed0303216b1ca8ff191b67c48e3254ffc317b049704862cff48071b8b192a79ed5065ac5b0ead29304cb797b508182afa9bf7dd381c4a161727
-
SSDEEP
3072:D0f6jMeqPqyow7Wje/6pNZuq8AdKsBPDwbMsykRRjEMSeQ0tyvBHMc:D0UWejzuqIsebMsFXsBMc
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-