General
-
Target
PO No. 27485758.exe
-
Size
228KB
-
Sample
220908-pq7caabgbn
-
MD5
47607a1861b00bcf044d136eadee4ab9
-
SHA1
a8879f81f8547d46930f0cd4ce338cf8af54232e
-
SHA256
3be69750b64f87e18bcd6d779fbc9511f17e57b8c7738d9374e262fb377ff56a
-
SHA512
486c4e12ec2f4cf27782e73c433a62f15e6021db2e890e94161a61a2bf591897cec8ce56bd162488bf5de1b676dc69e7ee104f8b27fde2a9126ca024a9266e1a
-
SSDEEP
3072:x+T6gqPPIvuvHQFpaIYkKEPIFJzE17vtx:n59HsaIYkb
Static task
static1
Behavioral task
behavioral1
Sample
PO No. 27485758.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PO No. 27485758.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
PO No. 27485758.exe
-
Size
228KB
-
MD5
47607a1861b00bcf044d136eadee4ab9
-
SHA1
a8879f81f8547d46930f0cd4ce338cf8af54232e
-
SHA256
3be69750b64f87e18bcd6d779fbc9511f17e57b8c7738d9374e262fb377ff56a
-
SHA512
486c4e12ec2f4cf27782e73c433a62f15e6021db2e890e94161a61a2bf591897cec8ce56bd162488bf5de1b676dc69e7ee104f8b27fde2a9126ca024a9266e1a
-
SSDEEP
3072:x+T6gqPPIvuvHQFpaIYkKEPIFJzE17vtx:n59HsaIYkb
-
StormKitty payload
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-