Resubmissions

15-09-2022 19:33

220915-x919dahfeq 10

15-09-2022 19:02

220915-xp1r4sdhb8 10

General

  • Target

    jVmDUI3M4mLH141.bin.zip

  • Size

    782KB

  • Sample

    220915-x919dahfeq

  • MD5

    0ff4c4e721beba20b8c17c710913671a

  • SHA1

    00dbb68c2f7ecf5869b614d43eb27aeef03228a5

  • SHA256

    09049dc883b74c4c6dbfcd2178ce9eccec59ddd476c9c4bfca4a40cace9de338

  • SHA512

    1445653899076b5bc52a56fcbae8000ec3e8890e915062fdaa6e2c7b2160e240f4b4429ac68ef58dc311f1096ab94a473d20dfd35314ba959a95b1c0497bc17e

  • SSDEEP

    12288:dSOX7QVEaDcFR0f9JDJEVLN2NDhbWrk0/3YFlkiraFoYrGrTPwl+PiF:bVycn0f9POLNiSL/4kiTYrMRPiF

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5608275589:AAEBKoKuUDc5lzk8kVGZfdScO_TE6z3q4UA/sendMessage?chat_id=5274798743

Targets

    • Target

      jVmDUI3M4mLH141.bin

    • Size

      924KB

    • MD5

      6b2874b71838bb35b1bbf5394322cf2a

    • SHA1

      e9f112a2cd8af4359d3833c59421b89dde2f52dd

    • SHA256

      346277a4a4b0582ad1e74421617c8d1c33708c0a3803ff2b56ab7bc3af0d7c53

    • SHA512

      4c315bbc83e1bc418d3bbbc6212a0c42d4aa4b73b4bf8c9f9bc7244b7fc833c5baa105b5c983383720cd04b415fa07d881857daf4efce028c21f947b8ecd261b

    • SSDEEP

      12288:sjVF75eQyMCHA4bPgkgPwqoXYkCkgrQlU2h3Wqzqqj3rZ8D8R/7pkqIwpq:kZ50MEZXYkCTQlU2VWqz9NWA/7R0

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks