General
-
Target
Build.bin
-
Size
574KB
-
Sample
250122-x48q9sslfj
-
MD5
1749aee9312b4b8361adfef5f030661f
-
SHA1
d09a1b15a479d1adf739ac0a8a0fcc496ba8b839
-
SHA256
569eb8e183947d368b9a38c83b73f852e4ae2401fc82db4458cabf7b04bc17fe
-
SHA512
7ea5b4c8050bce10579e14565003a89b43e03fb0bcfa3f3f10a83b28da0c2c43a703fb25dbe9e8645cf2717a82869f9b214cc6f86d253629260cd93702d43e73
-
SSDEEP
6144:SHYyAMe5/Jmfmk/CSIL9wiSEpb5QaLkFh9YEfRJ5IcPVAEUOcK6LRPdehjcedqmg:SHYyA9wfkx8rvaB75HoY6R
Behavioral task
behavioral1
Sample
Build.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Build.bin
-
Size
574KB
-
MD5
1749aee9312b4b8361adfef5f030661f
-
SHA1
d09a1b15a479d1adf739ac0a8a0fcc496ba8b839
-
SHA256
569eb8e183947d368b9a38c83b73f852e4ae2401fc82db4458cabf7b04bc17fe
-
SHA512
7ea5b4c8050bce10579e14565003a89b43e03fb0bcfa3f3f10a83b28da0c2c43a703fb25dbe9e8645cf2717a82869f9b214cc6f86d253629260cd93702d43e73
-
SSDEEP
6144:SHYyAMe5/Jmfmk/CSIL9wiSEpb5QaLkFh9YEfRJ5IcPVAEUOcK6LRPdehjcedqmg:SHYyA9wfkx8rvaB75HoY6R
-
StormKitty payload
-
Stormkitty family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1