General
-
Target
3cc67ef9b1c9978bc823e77db86d092e9f1df3062c4d98fc668920b7d7534122
-
Size
132KB
-
Sample
220913-whwddagbh9
-
MD5
986d46bd59fa8f0ec96a206312be5b01
-
SHA1
96b65230f6594524c3de2ebb717b1149e51625af
-
SHA256
3cc67ef9b1c9978bc823e77db86d092e9f1df3062c4d98fc668920b7d7534122
-
SHA512
c8c7bafeed2193f508806a49faf5ff30ce98dccdb04dc6861e61346bb5869478e529c7fe9c5025efbba2c762cba25375d874972a5020a4a6a18441f8a8d34743
-
SSDEEP
1536:iks/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoViocI6VPTHBQTvpOr:iTZTkLfhjFSiO3oyI6f2s
Behavioral task
behavioral1
Sample
3cc67ef9b1c9978bc823e77db86d092e9f1df3062c4d98fc668920b7d7534122.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5373590229:AAH5_bJ0JuiFbSG6WQwntRz245ybC0mPNk0/sendMessage?chat_id=2005009509
Targets
-
-
Target
3cc67ef9b1c9978bc823e77db86d092e9f1df3062c4d98fc668920b7d7534122
-
Size
132KB
-
MD5
986d46bd59fa8f0ec96a206312be5b01
-
SHA1
96b65230f6594524c3de2ebb717b1149e51625af
-
SHA256
3cc67ef9b1c9978bc823e77db86d092e9f1df3062c4d98fc668920b7d7534122
-
SHA512
c8c7bafeed2193f508806a49faf5ff30ce98dccdb04dc6861e61346bb5869478e529c7fe9c5025efbba2c762cba25375d874972a5020a4a6a18441f8a8d34743
-
SSDEEP
1536:iks/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoViocI6VPTHBQTvpOr:iTZTkLfhjFSiO3oyI6f2s
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-