General
-
Target
e3640607de0c7b2faee39b84bb660624714d2127af72f94647b2156fd69e7de6.exe
-
Size
123KB
-
Sample
250215-2r8yqaylak
-
MD5
91e525d7122f90730e6a77b643fb1eb6
-
SHA1
0b719cfaad5aa8a240d2b139c1b75266e0642c81
-
SHA256
e3640607de0c7b2faee39b84bb660624714d2127af72f94647b2156fd69e7de6
-
SHA512
9e841f3a2ee95dbe931bbf79ee485871aa7c18d81756bf4d17b87eac5d6c55814eac77a1000eb4cefef5a44026fac7878c72dba8f43303dfef8922aa1df1f495
-
SSDEEP
3072:Zn28xnE4SfnDGt7mTT287TFbi9kN72U53TXMmr5:BNnE5M7Uy0bwSV
Behavioral task
behavioral1
Sample
e3640607de0c7b2faee39b84bb660624714d2127af72f94647b2156fd69e7de6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3640607de0c7b2faee39b84bb660624714d2127af72f94647b2156fd69e7de6.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
e3640607de0c7b2faee39b84bb660624714d2127af72f94647b2156fd69e7de6.exe
-
Size
123KB
-
MD5
91e525d7122f90730e6a77b643fb1eb6
-
SHA1
0b719cfaad5aa8a240d2b139c1b75266e0642c81
-
SHA256
e3640607de0c7b2faee39b84bb660624714d2127af72f94647b2156fd69e7de6
-
SHA512
9e841f3a2ee95dbe931bbf79ee485871aa7c18d81756bf4d17b87eac5d6c55814eac77a1000eb4cefef5a44026fac7878c72dba8f43303dfef8922aa1df1f495
-
SSDEEP
3072:Zn28xnE4SfnDGt7mTT287TFbi9kN72U53TXMmr5:BNnE5M7Uy0bwSV
-
StormKitty payload
-
Stormkitty family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1