General
-
Target
a7c40b126375808dd70a9e69da9ac8b494b6de4439ae2e18fad52ff1f6b1fd2f.exe
-
Size
1.1MB
-
Sample
250101-2r4c8s1mfj
-
MD5
0ecbbe374de3cdc237c2cc469ffa2274
-
SHA1
fff64c336d813e1181bbc664ca29b23f7eb6c359
-
SHA256
a7c40b126375808dd70a9e69da9ac8b494b6de4439ae2e18fad52ff1f6b1fd2f
-
SHA512
74fee3a93398d6da6d862f116b6b70634d9221bdc46d06193103831a2b82f54589bbebc58a3f075627c27fa5367fd1a0fe2f441cfbd6125ef44963391518d9ab
-
SSDEEP
24576:CUSNXaV9x4IUgs36BUI2So5+jnzFoCaGApu8K:C90T+Sk6BU7HIFo7G98K
Behavioral task
behavioral1
Sample
a7c40b126375808dd70a9e69da9ac8b494b6de4439ae2e18fad52ff1f6b1fd2f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a7c40b126375808dd70a9e69da9ac8b494b6de4439ae2e18fad52ff1f6b1fd2f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a7c40b126375808dd70a9e69da9ac8b494b6de4439ae2e18fad52ff1f6b1fd2f.exe
-
Size
1.1MB
-
MD5
0ecbbe374de3cdc237c2cc469ffa2274
-
SHA1
fff64c336d813e1181bbc664ca29b23f7eb6c359
-
SHA256
a7c40b126375808dd70a9e69da9ac8b494b6de4439ae2e18fad52ff1f6b1fd2f
-
SHA512
74fee3a93398d6da6d862f116b6b70634d9221bdc46d06193103831a2b82f54589bbebc58a3f075627c27fa5367fd1a0fe2f441cfbd6125ef44963391518d9ab
-
SSDEEP
24576:CUSNXaV9x4IUgs36BUI2So5+jnzFoCaGApu8K:C90T+Sk6BU7HIFo7G98K
Score10/10-
StormKitty payload
-
Stormkitty family
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-