General
-
Target
1088-63-0x0000000000400000-0x0000000000422000-memory.dmp
-
Size
136KB
-
Sample
220909-txggnacdcr
-
MD5
9449c8cdccedd721a0cbe09c0b6affbd
-
SHA1
90a4f7161f0ce4509788f01f2057b889c8eae919
-
SHA256
bcc5de39bf3bbc5331d0e00e14213563058fa242eeab71a275a68d78b6e143ab
-
SHA512
b07836419d067fe60c290cba214e2dadc06291d4da45cdc9b669183197c983648609ae2d92776284f494168a4ddfa7e4b81a61ee73d9a8f41f1ed737e1843ece
-
SSDEEP
1536:t/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoViokHdJQwFrXjm3:JZTkLfhjFSiO3o6/FHI
Behavioral task
behavioral1
Sample
1088-63-0x0000000000400000-0x0000000000422000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1088-63-0x0000000000400000-0x0000000000422000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896
Targets
-
-
Target
1088-63-0x0000000000400000-0x0000000000422000-memory.dmp
-
Size
136KB
-
MD5
9449c8cdccedd721a0cbe09c0b6affbd
-
SHA1
90a4f7161f0ce4509788f01f2057b889c8eae919
-
SHA256
bcc5de39bf3bbc5331d0e00e14213563058fa242eeab71a275a68d78b6e143ab
-
SHA512
b07836419d067fe60c290cba214e2dadc06291d4da45cdc9b669183197c983648609ae2d92776284f494168a4ddfa7e4b81a61ee73d9a8f41f1ed737e1843ece
-
SSDEEP
1536:t/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoViokHdJQwFrXjm3:JZTkLfhjFSiO3o6/FHI
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-