General
-
Target
Build.exe
-
Size
123KB
-
Sample
250131-tz97rasqhn
-
MD5
0575237798a9569b08a53c229b199696
-
SHA1
218c85fb75a55e152b021d0c7d073fdf82075bf9
-
SHA256
132e1944cab755a8edbf514d773dc63b65ffc60db4fb0b9b2e0a78833002f63d
-
SHA512
b17832d7cdc1b48cf46a6923b0f32def2977fde131be34ed70ad6bdf1e3179d45281c418f32ab67d7a7b7acaa71bf5371bbb060fef2f1ca53fc3a9fb58548a62
-
SSDEEP
3072:en28xnE4SfnDGr7mT4687TFbi9kN72U53TXMmT:KNnE527Ub0bwS
Behavioral task
behavioral1
Sample
Build.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Build.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
Build.exe
-
Size
123KB
-
MD5
0575237798a9569b08a53c229b199696
-
SHA1
218c85fb75a55e152b021d0c7d073fdf82075bf9
-
SHA256
132e1944cab755a8edbf514d773dc63b65ffc60db4fb0b9b2e0a78833002f63d
-
SHA512
b17832d7cdc1b48cf46a6923b0f32def2977fde131be34ed70ad6bdf1e3179d45281c418f32ab67d7a7b7acaa71bf5371bbb060fef2f1ca53fc3a9fb58548a62
-
SSDEEP
3072:en28xnE4SfnDGr7mT4687TFbi9kN72U53TXMmT:KNnE527Ub0bwS
-
StormKitty payload
-
Stormkitty family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1