General
-
Target
537eefdd89c53025ce3e521a0dde0d2dd99bcf94f6063fd6b0823e259c72a26d
-
Size
158KB
-
Sample
220913-tqjnfagad3
-
MD5
da88b9d5a99843082b9258e087ae0ea9
-
SHA1
d425103a22463af1f8070f394a147b0e2d3ca8e9
-
SHA256
537eefdd89c53025ce3e521a0dde0d2dd99bcf94f6063fd6b0823e259c72a26d
-
SHA512
753c7298750a7342a1f14fe9d1bc5737f3f9de598192d4ea68621793024c210690f243d6e4092920c9204cd6517e5e9add89f61cad46a99150a4964d9c35d969
-
SSDEEP
3072:GspYocLKwD+MctFYFroOyKMPggSE9bdB4/tTc0owUdTZ5yMHHMc:YJN8FIWKzE9bdB4VTotMc
Static task
static1
Behavioral task
behavioral1
Sample
537eefdd89c53025ce3e521a0dde0d2dd99bcf94f6063fd6b0823e259c72a26d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
537eefdd89c53025ce3e521a0dde0d2dd99bcf94f6063fd6b0823e259c72a26d.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377
Targets
-
-
Target
537eefdd89c53025ce3e521a0dde0d2dd99bcf94f6063fd6b0823e259c72a26d
-
Size
158KB
-
MD5
da88b9d5a99843082b9258e087ae0ea9
-
SHA1
d425103a22463af1f8070f394a147b0e2d3ca8e9
-
SHA256
537eefdd89c53025ce3e521a0dde0d2dd99bcf94f6063fd6b0823e259c72a26d
-
SHA512
753c7298750a7342a1f14fe9d1bc5737f3f9de598192d4ea68621793024c210690f243d6e4092920c9204cd6517e5e9add89f61cad46a99150a4964d9c35d969
-
SSDEEP
3072:GspYocLKwD+MctFYFroOyKMPggSE9bdB4/tTc0owUdTZ5yMHHMc:YJN8FIWKzE9bdB4VTotMc
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-