General
-
Target
SecuriteInfo.com.Trojan.MSIL.Basic.5.Gen.21167.21247.exe
-
Size
777KB
-
Sample
220920-nswswsche3
-
MD5
ce4b52b35918a6aaae436aa29b5c9c0f
-
SHA1
fe4a06c24070a66782678c487db865fde69dc391
-
SHA256
3a0d8ce7111fd0d66caa1d06cb554a6e953e0f8d0b9828b53d5cc8318366e111
-
SHA512
4782192f68234e456cddbdb2b64a0300bd1c2ba1064fb222e977c10e3896555895b355b61ec5f1982207d8b23df4c6ceccc2d14d006712433f770a9669d2dbfa
-
SSDEEP
12288:6U4jXCnPKrDSaLvb2tRSCfJgMH5BxAaQSRFqwwgOmA:61jXMPKrDbDoRSCfGOPvlRhwkA
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.MSIL.Basic.5.Gen.21167.21247.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.MSIL.Basic.5.Gen.21167.21247.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5374342837:AAHF-c1HAIvNCdF89VuEdNggsL2YBlpgkSE/sendMessage?chat_id=2133303215
Targets
-
-
Target
SecuriteInfo.com.Trojan.MSIL.Basic.5.Gen.21167.21247.exe
-
Size
777KB
-
MD5
ce4b52b35918a6aaae436aa29b5c9c0f
-
SHA1
fe4a06c24070a66782678c487db865fde69dc391
-
SHA256
3a0d8ce7111fd0d66caa1d06cb554a6e953e0f8d0b9828b53d5cc8318366e111
-
SHA512
4782192f68234e456cddbdb2b64a0300bd1c2ba1064fb222e977c10e3896555895b355b61ec5f1982207d8b23df4c6ceccc2d14d006712433f770a9669d2dbfa
-
SSDEEP
12288:6U4jXCnPKrDSaLvb2tRSCfJgMH5BxAaQSRFqwwgOmA:61jXMPKrDbDoRSCfGOPvlRhwkA
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-