General

  • Target

    SecuriteInfo.com.Variant.Lazy.243500.8429.32613.exe

  • Size

    171KB

  • Sample

    220915-mm9bcsgebl

  • MD5

    49d5d24cbb05b73ff7b6b5202562bea6

  • SHA1

    9fc158a090dc9d12d9281baac20d4aec2e223c16

  • SHA256

    f6743599ef8f0c90e862c9f7ef8fc0718f7faf6315797e06c43ed4b14686be23

  • SHA512

    f44d5cb085c375b6027fd2fd40d7e1f1ed27082c47007e2750fe0174c1295ed52a0edbc8929fea4739f858ca7f352947f14a6522514b34ba127fc3393a26ab8b

  • SSDEEP

    3072:kxr/raVa3+8U1wNSuI1CzT1f/yMvAOhaKKDGI5BvlAgqod/Nk/YPR2yfkHm:kxSVlwI1WycAOhaKiGaZlAgqE/Nk/YPv

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377

Targets

    • Target

      SecuriteInfo.com.Variant.Lazy.243500.8429.32613.exe

    • Size

      171KB

    • MD5

      49d5d24cbb05b73ff7b6b5202562bea6

    • SHA1

      9fc158a090dc9d12d9281baac20d4aec2e223c16

    • SHA256

      f6743599ef8f0c90e862c9f7ef8fc0718f7faf6315797e06c43ed4b14686be23

    • SHA512

      f44d5cb085c375b6027fd2fd40d7e1f1ed27082c47007e2750fe0174c1295ed52a0edbc8929fea4739f858ca7f352947f14a6522514b34ba127fc3393a26ab8b

    • SSDEEP

      3072:kxr/raVa3+8U1wNSuI1CzT1f/yMvAOhaKKDGI5BvlAgqod/Nk/YPR2yfkHm:kxSVlwI1WycAOhaKiGaZlAgqE/Nk/YPv

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks