General
-
Target
SecuriteInfo.com.Trojan.PackedNET.1293.25944.579.exe
-
Size
171KB
-
Sample
220920-xs71lahggk
-
MD5
3f302c49278e12a784224ab5e843b550
-
SHA1
ca15f2c458dc63f69d96c9b61437326f8a9f37fd
-
SHA256
f218fa4276e991739589e3f96b0abc8f53d499b88f2d824beedc01ce49e53bcc
-
SHA512
edbb3d882dec265c45fe529ea90849ecfa67152a9eb13d108a15dd0f97c0376649d6a0ab65c2745925cd8bc5460c7a5475971e9b7c4408d5be5153cdecad452c
-
SSDEEP
3072:UWF+Dtae1EdgDt+Tr9lxGs3bRQ1t9VArqOuwBgvuXkJ0eiMNsTEmSHm:UWEDt1Ed28lxGs3bR8t9uBuYgvuXkJX8
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PackedNET.1293.25944.579.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.PackedNET.1293.25944.579.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377
Targets
-
-
Target
SecuriteInfo.com.Trojan.PackedNET.1293.25944.579.exe
-
Size
171KB
-
MD5
3f302c49278e12a784224ab5e843b550
-
SHA1
ca15f2c458dc63f69d96c9b61437326f8a9f37fd
-
SHA256
f218fa4276e991739589e3f96b0abc8f53d499b88f2d824beedc01ce49e53bcc
-
SHA512
edbb3d882dec265c45fe529ea90849ecfa67152a9eb13d108a15dd0f97c0376649d6a0ab65c2745925cd8bc5460c7a5475971e9b7c4408d5be5153cdecad452c
-
SSDEEP
3072:UWF+Dtae1EdgDt+Tr9lxGs3bRQ1t9VArqOuwBgvuXkJ0eiMNsTEmSHm:UWEDt1Ed28lxGs3bR8t9uBuYgvuXkJX8
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-