General

  • Target

    PussyKiller.exe

  • Size

    74KB

  • MD5

    7acd7ca811c678a92d62d556cae858dc

  • SHA1

    b05d0fd47d2d905234db53614f725e3744c93b3e

  • SHA256

    736f8b467d09e4805d336c56b49ec183355dc433e04b93904d2e8d5876d5b9de

  • SHA512

    24fe70950fc092d9de383f5c80c70bdc4bd5e342b927e2fb495752e0036c3d2eb0547f60467ef5019a686fffd2f8057105d13dd566172f9438ffe4434748166b

  • SSDEEP

    1536:rNtW7bvrmSbUMiuidaw6v3ZfXR6/A8Id0FWGV09auvIUxjFxtbm:rzTyXRKA8Iwg9auvIUhFxty

Score
10/10

Malware Config

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • PussyKiller.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections