General

  • Target

    ec17c87657c179cf67a732f1e21542bbf7ed3a1042b686118f42ec8ca61beea5

  • Size

    545KB

  • MD5

    a115478a0b50daa5f7769fdac306c4f9

  • SHA1

    ccf4c3fb97e766825731b758a004b315ae984a85

  • SHA256

    ec17c87657c179cf67a732f1e21542bbf7ed3a1042b686118f42ec8ca61beea5

  • SHA512

    f849f4aa57637f48de6ee9eb1afa5f27f423222fef3e432a1e67c517211ad28619c9e8e7ed0bc26d09683c55c4685413196e9a7d6a66078662f087886307986f

  • SSDEEP

    12288:G9vE+VF9mOx9ukEv3g6drKcXrCf/QOKx/KjWFY:+vE+V3mOGk+dddCf3klY

Score
10/10

Malware Config

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Detected Nirsoft tools 1 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ec17c87657c179cf67a732f1e21542bbf7ed3a1042b686118f42ec8ca61beea5
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections