Behavioral task
behavioral1
Sample
a79fd77fb68125a4df09c38cd622225180a53db0b22423ef5faa51ba1a37f0a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a79fd77fb68125a4df09c38cd622225180a53db0b22423ef5faa51ba1a37f0a4.exe
Resource
win10v2004-20231215-en
General
-
Target
a79fd77fb68125a4df09c38cd622225180a53db0b22423ef5faa51ba1a37f0a4
-
Size
13.4MB
-
MD5
b6171b79d074f6209ad45593fef74233
-
SHA1
2dbcaaea4307e8c52824f21f5d76dd14ffbc9306
-
SHA256
a79fd77fb68125a4df09c38cd622225180a53db0b22423ef5faa51ba1a37f0a4
-
SHA512
8183dd88e8c8c2952ca5fa227210edfc55a8b5bc712b1ba6af7e09318a16434399a812af292124072fb76712055aafe27ef91206135a597d369a8975620b892e
-
SSDEEP
196608:X4A0/BZo55gBE32hifcgw+dhSh+zVuU0XNb7:X4A0/B/Bhjgw+dhHMJ7
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
84.205.7.83:7167
Extracted
metasploit
metasploit_stager
35.182.213.89:443
Signatures
-
Metasploit family
-
StormKitty payload 1 IoCs
resource yara_rule sample family_stormkitty -
Stormkitty family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a79fd77fb68125a4df09c38cd622225180a53db0b22423ef5faa51ba1a37f0a4
Files
-
a79fd77fb68125a4df09c38cd622225180a53db0b22423ef5faa51ba1a37f0a4.exe windows:0 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
Size: 13.4MB - Virtual size: 13.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ