General
-
Target
1484-59-0x0000000000400000-0x0000000000424000-memory.dmp
-
Size
144KB
-
Sample
220908-nejleaedg5
-
MD5
4e2bfb6a6c6763c91351616895d3704e
-
SHA1
da397af3ce8ae87b224dc68d21961224dabb13e9
-
SHA256
d569cf8a839574dce7af4154ed9369c332bc9b1078c7132e550491641f430a43
-
SHA512
e5499a0ad96c80f63889bcef898601eca0498e0c2349837593b0d5d3ba2bd0ec6711c6f82558d1ed825d1a402c789489213548fcfd8f4a346c53af4084a796ea
-
SSDEEP
1536:r65/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoVioOO4yX5t4l7yYipC:r69ZTkLfhjFSiO3ocO4yX34lmYg
Behavioral task
behavioral1
Sample
1484-59-0x0000000000400000-0x0000000000424000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1484-59-0x0000000000400000-0x0000000000424000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
1484-59-0x0000000000400000-0x0000000000424000-memory.dmp
-
Size
144KB
-
MD5
4e2bfb6a6c6763c91351616895d3704e
-
SHA1
da397af3ce8ae87b224dc68d21961224dabb13e9
-
SHA256
d569cf8a839574dce7af4154ed9369c332bc9b1078c7132e550491641f430a43
-
SHA512
e5499a0ad96c80f63889bcef898601eca0498e0c2349837593b0d5d3ba2bd0ec6711c6f82558d1ed825d1a402c789489213548fcfd8f4a346c53af4084a796ea
-
SSDEEP
1536:r65/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoVioOO4yX5t4l7yYipC:r69ZTkLfhjFSiO3ocO4yX34lmYg
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-