General
-
Target
c177d70d7e3fd9c9499011cce57cc800
-
Size
1.3MB
-
Sample
240311-yqwefscg9z
-
MD5
c177d70d7e3fd9c9499011cce57cc800
-
SHA1
418e8e996d6e2e5e0d58a74276a771492b0e7283
-
SHA256
9e1dd477999ef5e83ef7e238a8c1df3b1b618c1f5cc72a8a98dd4352b06267a5
-
SHA512
2055b5f3ab4376c49f5ab055b09ced4c0bf4a484cd6aae94d1b6bbc9dfecc6e28c9d7c57f97ef64588bc9249e5c7cf25c24acbeb5cf5b02a8e44b022b00c7281
-
SSDEEP
24576:1LF7NWgiaJrPJTLbGi777hcCwJ5sfeKuCdeMj65PJUSJ+QRZKiCoXvHUZC8ur8h9:NthjlpLbGCwJOfrn45prP/0Rur8hfl
Static task
static1
Behavioral task
behavioral1
Sample
c177d70d7e3fd9c9499011cce57cc800.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c177d70d7e3fd9c9499011cce57cc800.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
c177d70d7e3fd9c9499011cce57cc800
-
Size
1.3MB
-
MD5
c177d70d7e3fd9c9499011cce57cc800
-
SHA1
418e8e996d6e2e5e0d58a74276a771492b0e7283
-
SHA256
9e1dd477999ef5e83ef7e238a8c1df3b1b618c1f5cc72a8a98dd4352b06267a5
-
SHA512
2055b5f3ab4376c49f5ab055b09ced4c0bf4a484cd6aae94d1b6bbc9dfecc6e28c9d7c57f97ef64588bc9249e5c7cf25c24acbeb5cf5b02a8e44b022b00c7281
-
SSDEEP
24576:1LF7NWgiaJrPJTLbGi777hcCwJ5sfeKuCdeMj65PJUSJ+QRZKiCoXvHUZC8ur8h9:NthjlpLbGCwJOfrn45prP/0Rur8hfl
Score10/10-
StormKitty payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-