General
-
Target
4.exe
-
Size
63KB
-
Sample
240711-cq22cawbqh
-
MD5
910f96ec798932aaa9902a0e58a45abe
-
SHA1
5a2c806f21b9cba3abf745e2fd2b09e4313dcc36
-
SHA256
03fa1a87d4065499ab338c94976e19bf53d95e4a655ff598da6fe4d4cd85e861
-
SHA512
345794e886be99bc80f1ac200601da680e07dd660d4a5581c1d7d8573f6aa62bc2f41255a64bdb3697ae6b012e716a591c6acc98df09d150cd500dd6a370e68d
-
SSDEEP
768:LnuguX1wbgyX78dIC8A+Xky7NirX8RvKq1+T4+SBGHmDbDtph0oXZutYhfqSu8dP:jvCCPTT7c8IqNYUbXh9lBdu8dpqKmY7
Behavioral task
behavioral1
Sample
4.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
asyncrat
Default
147.185.221.21:6643
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
4.exe
-
Size
63KB
-
MD5
910f96ec798932aaa9902a0e58a45abe
-
SHA1
5a2c806f21b9cba3abf745e2fd2b09e4313dcc36
-
SHA256
03fa1a87d4065499ab338c94976e19bf53d95e4a655ff598da6fe4d4cd85e861
-
SHA512
345794e886be99bc80f1ac200601da680e07dd660d4a5581c1d7d8573f6aa62bc2f41255a64bdb3697ae6b012e716a591c6acc98df09d150cd500dd6a370e68d
-
SSDEEP
768:LnuguX1wbgyX78dIC8A+Xky7NirX8RvKq1+T4+SBGHmDbDtph0oXZutYhfqSu8dP:jvCCPTT7c8IqNYUbXh9lBdu8dpqKmY7
-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-