General
-
Target
456c0f28c52578f27a0859bde7cd01543bbacb94295d195b440a097a000f1ced
-
Size
1.2MB
-
Sample
240818-hn1cma1fpd
-
MD5
716f68698217c9112d1b2ec962837ab3
-
SHA1
d667d2b2191792231bbb99ebb3b7cdc0e1753be2
-
SHA256
456c0f28c52578f27a0859bde7cd01543bbacb94295d195b440a097a000f1ced
-
SHA512
caee0cfe43d8497a86e07911f210567bab8d6a871609ceafa11ed73c37bcec2413cfa549787d5cc1ccfe288b08cca9adf8c182f758638e66d04ebc6f00a4f6e8
-
SSDEEP
24576:QtzhXvW/gzWQGDEqBUl6KvPN6zHdK4aYX2ef5xr/qpnFWX/yI:UzFvW/UWNDPUl6KHN6vadeDi0J
Static task
static1
Behavioral task
behavioral1
Sample
9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe
-
Size
1.5MB
-
MD5
ff83471ce09ebbe0da07d3001644b23c
-
SHA1
672aa37f23b421e4afba46218735425f7acc29c2
-
SHA256
9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba
-
SHA512
179c724558065de4b7ea11dd75588df51a3fce737db3ebc77c8fdc0b3a432f6f1fdcc5acd2e2706ab0f088c35a3310c9e638de92ce0a644322eae46729aea259
-
SSDEEP
24576:nK7tMGUfQtpOdk3xWBq0qWH6JubmMTzfZwLDC4pZylqUAc2:JQ7AkiqQaJjMHWvlpOqUt2
Score10/10-
StormKitty payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-