General
-
Target
ess.pif
-
Size
38KB
-
Sample
240417-x2s8ssch41
-
MD5
a657e08819360c2d09a02900c1340cc1
-
SHA1
009c944d9182e96a4d1a67f09dbe2edd0864b068
-
SHA256
f66d125ed2d2267ac2de3b7290b0abfa9a1b4265d04ed872a4d96888888d5296
-
SHA512
0ef5ddc58e4d30d4df2200b18ac66671fb223924011854242e0702b89b75c9d1fa54ef88d9a133309f0c20e021ebe1d39a6626172f6e37c73b356f349d4405d9
-
SSDEEP
768:P5fQwpevonRaGqwhXARyrjJj9HNy6B6SE7NL:P5pa1whXA4x9tJop7NL
Malware Config
Targets
-
-
Target
ess.pif
-
Size
38KB
-
MD5
a657e08819360c2d09a02900c1340cc1
-
SHA1
009c944d9182e96a4d1a67f09dbe2edd0864b068
-
SHA256
f66d125ed2d2267ac2de3b7290b0abfa9a1b4265d04ed872a4d96888888d5296
-
SHA512
0ef5ddc58e4d30d4df2200b18ac66671fb223924011854242e0702b89b75c9d1fa54ef88d9a133309f0c20e021ebe1d39a6626172f6e37c73b356f349d4405d9
-
SSDEEP
768:P5fQwpevonRaGqwhXARyrjJj9HNy6B6SE7NL:P5pa1whXA4x9tJop7NL
-
StormKitty payload
-
Async RAT payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-